IOC Report
FpiUD4nYpj.exe

loading gif

Files

File Path
Type
Category
Malicious
FpiUD4nYpj.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\2FBE.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\34CA.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\BD9E.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedLumma\g2m.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedLumma\lm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\g2m.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\rentry-script.ps1
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyStartupScript.vbs
ASCII text, with CRLF line terminators
modified
malicious
C:\Users\user\AppData\Roaming\jjistfr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\jjistfr:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_lm.exe_ed6b1a814e4ec1e6e89791b3995c66bc9bb83_5fe582ea_4585aa2b-09a4-4321-a029-216d7f5f1659\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_vm.exe_12b9a62f7c411e90f74ee59af3dcf249dad3f7e8_19c5d0bb_5cda0b46-1c1f-4ec5-ad2f-eeb1ce6af232\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA01C.tmp.dmp
Mini DuMP crash report, 14 streams, Sat Jul 27 06:54:58 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA1C3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA241.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBEEE.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Jul 27 06:55:06 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0D4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC0F4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\BD9E.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\vm.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\Explorer\NotifyIcon\Microsoft.Explorer.Notification.{1A9F1A36-3C09-FABC-074C-A7C43D9E3759}.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\ExtractedLumma\data.bin
data
dropped
C:\Users\user\AppData\Local\Temp\ExtractedLumma\run.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ExtractedVenom\data.bin
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d2q1enli.aly.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ds40pw40.fgb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dvnk2koo.3zc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pk1a0vey.sg1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q205syu0.b5t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vvgemafc.zot.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\lumma.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\venom.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\{07036ADB-1CD6-4B03-9F61-A81C88B2E799}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{221CB7D1-ACDF-4515-9B12-B345D83C4B72}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{327941D6-724D-4966-9762-A326B2525378}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{361DAB93-4295-43D3-8AE5-A867C82BBE71}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{39B69EAA-9F7A-4CDE-8D7A-0C897DD82D9B}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{EEA4F1D0-28C9-4638-A52E-4C318BD324E5}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\{F836E79C-F7CE-41B2-B256-2B925A0BAB57}.png
PNG image data, 306 x 306, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Roaming\MyData\DataLogs.conf
ASCII text
modified
\Device\Null
ASCII text
dropped
There are 35 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FpiUD4nYpj.exe
"C:\Users\user\Desktop\FpiUD4nYpj.exe"
malicious
C:\Windows\explorer.exe
C:\Windows\Explorer.EXE
malicious
C:\Users\user\AppData\Roaming\jjistfr
C:\Users\user\AppData\Roaming\jjistfr
malicious
C:\Users\user\AppData\Local\Temp\2FBE.exe
C:\Users\user\AppData\Local\Temp\2FBE.exe
malicious
C:\Users\user\AppData\Local\Temp\34CA.exe
C:\Users\user\AppData\Local\Temp\34CA.exe
malicious
C:\Users\user\AppData\Local\Temp\BD9E.exe
C:\Users\user\AppData\Local\Temp\BD9E.exe
malicious
C:\Users\user\AppData\Local\Temp\BD9E.exe
"C:\Users\user\AppData\Local\Temp\BD9E.exe" -HOSTRUNAS
malicious
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -WindowStyle Hidden -File "C:\Users\user\AppData\Local\Temp\rentry-script.ps1"
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
"vm.exe"
malicious
C:\Users\user\AppData\Local\Temp\ExtractedLumma\lm.exe
"lm.exe"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MyStartupScript.vbs"
malicious
C:\Users\user\AppData\Local\Temp\ExtractedVenom\vm.exe
"vm.exe"
malicious
C:\Users\user\AppData\Local\Temp\2FBE.exe
"C:\Users\user\AppData\Local\Temp\2FBE.exe"
malicious
C:\Users\user\AppData\Local\Temp\2FBE.exe
"C:\Users\user\AppData\Local\Temp\2FBE.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c C:\Users\user\AppData\Local\Temp\ExtractedLumma\run.bat
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Local\Temp\ExtractedVenom\runvm.bat" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5252 -s 1128
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4936 -s 1848
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://100xmargin.com/tmp/index.php
malicious
https://liernessfornicsa.shop/-
unknown
malicious
https://liernessfornicsa.shop/apitg
unknown
malicious
http://olinsw.ws/tmp/index.php
malicious
https://liernessfornicsa.shop/0
unknown
malicious
http://mzxn.ru/tmp/index.php
malicious
callosallsaospz.shop
malicious
liernessfornicsa.shop
malicious
https://liernessfornicsa.shop/q
unknown
malicious
https://107.173.160.139/
107.173.160.139
malicious
https://liernessfornicsa.shop/apii
unknown
malicious
shepherdlyopzc.shop
malicious
upknittsoappz.shop
malicious
https://mussangroup.com/wp-content/images/pic1.jpg
185.149.100.242
malicious
https://liernessfornicsa.shop/N
unknown
malicious
https://liernessfornicsa.shop/S
unknown
malicious
unseaffarignsk.shop
malicious
https://liernessfornicsa.shop/apiH7%
unknown
malicious
http://wgdnb4rc.xyz/tmp/index.php
malicious
https://107.173.160.137/
107.173.160.137
malicious
https://aka.ms/odirmr
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://duckduckgo.com/ac/?q=
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
unknown
https://api.msn.com:443/v1/news/Feed/Windows?
unknown
http://ocsps.ssl.com0?
unknown
http://www.ssl.com/repository/SSLcomRootCertificationAuthorityRSA.crt0
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://www.fontbureau.com/designers
unknown
http://crls.ssl.com/SSLcom-RootCA-EV-RSA-4096-R2.crl0
unknown
https://excel.office.com
unknown
https://callosallsaospz.shop/api3QFjF/HP
unknown
https://callosallsaospz.shop/apiD
unknown
https://www.msn.com/en-us/news/us/a-nationwide-emergency-alert-will-be-sent-to-all-u-s-cellphones-we
unknown
https://simpleflying.com/how-do-you-become-an-air-traffic-controller/
unknown
https://store4.gofile.io/download/direct/0656c5cf-51b4-4fa4-ae48-8ee5ed3d142e/lm.zip
31.14.70.245
http://www.sajatypeworks.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu-dark
unknown
https://nuget.org/nuget.exe
unknown
http://ocsps.ssl.com0_
unknown
http://www.galapagosdesign.com/DPlease
unknown
https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppcrobat.exe
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://rentry.co
unknown
http://www.oberhumer.com
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
http://www.autoitscript.com/autoit3/J
unknown
https://wns.windows.com/L
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://word.office.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://store4.gofile.io
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
unknown
https://go.micro
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gHZu
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://www.msn.com/en-us/weather/topstories/us-weather-super-el-nino-to-bring-more-flooding-and-win
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://cert.ssl.com/SSLcom-SubCA-EV-CodeSigning-RSA-4096-R3.cer0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
unknown
https://www.ecosia.org/newtab/
unknown
https://www.msn.com/en-us/news/politics/clarence-thomas-in-spotlight-as-supreme-court-delivers-blow-
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
http://www.carterandcone.coml
unknown
https://callosallsaospz.shop:443/api
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gMeu
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13gTUY-dark
unknown
https://www.rd.com/list/polite-habits-campers-dislike/
unknown
https://android.notify.windows.com/iOS
unknown
https://store4.gofile.io/download/direct/6b24ec97-2a8d-468d-a24d-c8081cda1dab/vm.zip
31.14.70.245
https://support.microsof
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://img.s-msn.com/tenant/amp/entityid/AAbC0oi.img
unknown
https://outlook.com_
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://www.rd.com/newsletter/?int_source=direct&int_medium=rd.com&int_campaign=nlrda_20221001_toppe
unknown
https://callosallsaospz.shop/
unknown
https://www.msn.com/en-us/news/world/agostini-krausz-and-l-huillier-win-physics-nobel-for-looking-at
unknown
http://html4/loose.dtd
unknown
https://callosallsaospz.shop/api
188.114.97.3
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
https://www.msn.com/en-us/news/us/when-does-daylight-saving-time-end-2023-here-s-when-to-set-your-cl
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
funrecipebooks.com
162.0.235.84
malicious
rentry.co
104.26.2.16
malicious
mzxn.ru
211.40.39.251
malicious
liernessfornicsa.shop
172.67.213.85
malicious
mussangroup.com
185.149.100.242
malicious
callosallsaospz.shop
188.114.97.3
malicious
store4.gofile.io
31.14.70.245

IPs

IP
Domain
Country
Malicious
77.221.157.163
unknown
Russian Federation
malicious
107.173.160.139
unknown
United States
malicious
107.173.160.137
unknown
United States
malicious
172.67.213.85
liernessfornicsa.shop
United States
malicious
162.0.235.84
funrecipebooks.com
Canada
malicious
109.172.114.212
unknown
Russian Federation
malicious
64.190.113.113
unknown
United States
malicious
94.156.79.190
unknown
Bulgaria
malicious
188.114.97.3
callosallsaospz.shop
European Union
malicious
78.89.199.216
unknown
Kuwait
malicious
104.26.2.16
rentry.co
United States
malicious
167.235.128.153
unknown
United States
malicious
193.222.96.24
unknown
Germany
malicious
185.149.100.242
mussangroup.com
Turkey
malicious
190.12.87.61
unknown
Peru
malicious
31.14.70.245
store4.gofile.io
Virgin Islands (BRITISH)
There are 6 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Update#0005_8yUscnjrUY
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:00000000000B0068
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040272
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000090282
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080160
VirtualDesktop
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13137
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@explorerframe.dll,-13138
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithProgids
VBSFile
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@C:\Windows\System32\wshext.dll,-4511
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\JFpevcg.rkr
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vbs\OpenWithList
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
a
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithProgids
Unpacker
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000080454
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
b
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:000000000003044A
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000040444
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{9E04CAB2-CC14-11DF-BB8C-A2F1DED72085}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{FA99DFC7-6AC2-453A-A5E2-5E2AFF4507BD}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CAA59E3C-4792-41A5-9909-6A6A8D32490E}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{A3D53349-6E61-4557-8FC7-0028EDCEEBF6}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F2A1CB5A-E3CC-4A2E-AF9D-505A7009D442}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{BCB48336-4DDD-48FF-BB0B-D3190DACB3E2}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SessionInfo\1\ApplicationViewManagement\W32:0000000000070442
VirtualDesktop
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
Classes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\ShellNew
~reserved~
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shell\Bags\1\Desktop
IconLayouts
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Security and Maintenance\Checks\{E8433B72-5842-4d43-8645-BC2C35960837}.check.102
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced
TaskbarStateLastRun
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021492-0000-0000-C000-000000000046}\Enum
Implementing
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3g2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gp2\OpenWithProgids
WMP11.AssocFile.3G2
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.3gpp\OpenWithProgids
WMP11.AssocFile.3GP
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aac\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\OpenWithProgids
WMP11.AssocFile.ADTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aif\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aifc\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.aiff\OpenWithProgids
WMP11.AssocFile.AIFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asf\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.asx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au3\OpenWithProgids
AutoIt3Script
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\OpenWithProgids
WMP11.AssocFile.AVI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.bmp\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cab\OpenWithProgids
CABFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cdxml\OpenWithProgids
Microsoft.PowerShellCmdletDefinitionXML.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.css\OpenWithProgids
CSSfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.csv\OpenWithProgids
Excel.CSV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dds\OpenWithProgids
ddsfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\OpenWithProgids
Paint.Picture
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dll\OpenWithProgids
dllfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.doc\OpenWithProgids
Word.Document.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docm\OpenWithProgids
Word.DocumentMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.docx\OpenWithProgids
Word.Document.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dot\OpenWithProgids
Word.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotm\OpenWithProgids
Word.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dotx\OpenWithProgids
Word.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.emf\OpenWithProgids
emffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.exe\OpenWithProgids
exefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.flac\OpenWithProgids
WMP11.AssocFile.FLAC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.fon\OpenWithProgids
fonfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.gif\OpenWithProgids
giffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithProgids
htmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ico\OpenWithProgids
icofile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.inf\OpenWithProgids
inffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ini\OpenWithProgids
inifile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jfif\OpenWithProgids
pjpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpe\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\OpenWithProgids
jpegfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jxr\OpenWithProgids
wdpfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.lnk\OpenWithProgids
lnkfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m1v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m2t\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m3u\OpenWithProgids
WMP11.AssocFile.m3u
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4a\OpenWithProgids
WMP11.AssocFile.M4A
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mhtml\OpenWithProgids
mhtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mid\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mk3d\OpenWithProgids
WMP11.AssocFile.MK3D
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mka\OpenWithProgids
WMP11.AssocFile.MKA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mkv\OpenWithProgids
WMP11.AssocFile.MKV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mod\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mov\OpenWithProgids
WMP11.AssocFile.MOV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.MP2\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp2v\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3\OpenWithProgids
WMP11.AssocFile.MP3
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\OpenWithProgids
WMP11.AssocFile.MP4
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpeg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpg\OpenWithProgids
WMP11.AssocFile.MPEG
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.msg\OpenWithProgids
Outlook.File.msg.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mts\OpenWithProgids
WMP11.AssocFile.M2TS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ocx\OpenWithProgids
ocxfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odp\OpenWithProgids
PowerPoint.OpenDocumentPresentation.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ods\OpenWithProgids
Excel.OpenDocumentSpreadsheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.odt\OpenWithProgids
Word.OpenDocumentText.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.otf\OpenWithProgids
otffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\OpenWithProgids
pngfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pot\OpenWithProgids
PowerPoint.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potm\OpenWithProgids
PowerPoint.TemplateMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.potx\OpenWithProgids
PowerPoint.Template.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppam\OpenWithProgids
PowerPoint.Addin.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsm\OpenWithProgids
PowerPoint.SlideShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppsx\OpenWithProgids
PowerPoint.SlideShow.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ppt\OpenWithProgids
PowerPoint.Show.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptm\OpenWithProgids
PowerPoint.ShowMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pptx\OpenWithProgids
PowerPoint.Show.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1\OpenWithProgids
Microsoft.PowerShellScript.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ps1xml\OpenWithProgids
Microsoft.PowerShellXMLData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psd1\OpenWithProgids
Microsoft.PowerShellData.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.psm1\OpenWithProgids
Microsoft.PowerShellModule.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pssc\OpenWithProgids
Microsoft.PowerShellSessionConfiguration.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rle\OpenWithProgids
rlefile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithProgids
WMP11.AssocFile.MIDI
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rtf\OpenWithProgids
Word.RTF.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.scf\OpenWithProgids
SHCmdFile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.search-ms\OpenWithProgids
SearchFolder
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.shtml\OpenWithProgids
shtmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldm\OpenWithProgids
PowerPoint.SlideMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sldx\OpenWithProgids
PowerPoint.Slide.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithProgids
WMP11.AssocFile.AU
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.sys\OpenWithProgids
sysfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tif\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.tiff\OpenWithProgids
TIFImage.Document
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttc\OpenWithProgids
ttcfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.ttf\OpenWithProgids
ttffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TTS\OpenWithProgids
WMP11.AssocFile.TTS
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.txt\OpenWithProgids
txtfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.vsto\OpenWithProgids
bootstrap.vsto.1
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\OpenWithProgids
WMP11.AssocFile.WAV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wax\OpenWithProgids
WMP11.AssocFile.WAX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wm\OpenWithProgids
WMP11.AssocFile.ASF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wma\OpenWithProgids
WMP11.AssocFile.WMA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmf\OpenWithProgids
wmffile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\OpenWithProgids
WMP11.AssocFile.WMV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmx\OpenWithProgids
WMP11.AssocFile.ASX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WPL\OpenWithProgids
WMP11.AssocFile.WPL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wvx\OpenWithProgids
WMP11.AssocFile.WVX
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlam\OpenWithProgids
Excel.AddInMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xls\OpenWithProgids
Excel.Sheet.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsb\OpenWithProgids
Excel.SheetBinaryMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsm\OpenWithProgids
Excel.SheetMacroEnabled.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlsx\OpenWithProgids
Excel.Sheet.12
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xlt\OpenWithProgids
Excel.Template.8
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltm\OpenWithProgids
Excel.TemplateMacroEnabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xltx\OpenWithProgids
Excel.Template
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xml\OpenWithProgids
xmlfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xsl\OpenWithProgids
xslfile
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
SlowContextMenuEntries
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
MRUList
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Trgfgnegrq_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.JvaqbjfSrrqonpxUho_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.JvaqbjfZncf_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Crbcyr_8jrxlo3q8oojr!k4p7n3o7ql2188l46q4ln362l19np5n5805r5k
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.ZvpebfbsgFgvpxlAbgrf_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\FavccvatGbby.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.JvaqbjfPnyphyngbe_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\zfcnvag.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.PybhqRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.FuryyRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
ZFRqtr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.PbagebyCnary
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Frnepu_pj5a1u2gklrjl!PbegnanHV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Puebzr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
jvaqbjf.vzzrefvirpbagebycnary_pj5a1u2gklrjl!zvpebfbsg.jvaqbjf.vzzrefvirpbagebycnary
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
308046O0NS4N39PO
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Nqbor\Npebong QP\Npebong\Npebong.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\BcraJvgu.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.FgnegZrahRkcrevraprUbfg_pj5a1u2gklrjl!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\pzq.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\Qrfxgbc\BssvprFrghc.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Pbzzba Svyrf\zvpebfbsg funerq\PyvpxGbEha\BssvprPyvpxGbEha.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\Pbzzba Svyrf\zvpebfbsg funerq\PyvpxGbEha\BssvprP2EPyvrag.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Bssvpr.RKPRY.RKR.15
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
R:\Frghc.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
R:\Bssvpr\Frghc32.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
\\192.168.2.1\nyy\bssvprqrcyblzraggbby_16731-20290.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
\\192.168.2.1\nyy\bssvpr2016ibyhzryvprafrcnpx_4324-1002_ra-hf_k86.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\pfpevcg.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.FrpUrnyguHV_pj5a1u2gklrjl!FrpUrnyguHV
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{6Q809377-6NS0-444O-8957-N3773S02200R}\7-Mvc\7mSZ.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\abgrcnq.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{7P5N40RS-N0SO-4OSP-874N-P0S2R0O9SN8R}\NhgbVg3\NhgbVg3.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.TrgUryc_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.KobkTnzvatBireynl_8jrxlo3q8oojr!Ncc
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{Q65231O0-O2S1-4857-N4PR-N8R7P6RN7Q27}\JvaqbjfCbjreFuryy\i1.0\cbjrefuryy.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
\\192.168.2.1\nyy\cngputhneq-qvfnoyre-nyy-irefvbaf.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
{1NP14R77-02R7-4R5Q-O744-2RO1NR5198O7}\JFpevcg.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Furyy.EhaQvnybt
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Npprffbevrf\Favccvat Gbby.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Npprffbevrf\Cnvag.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Flfgrz Gbbyf\Pbageby Cnary.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\Choyvp\Qrfxgbc\Tbbtyr Puebzr.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\Choyvp\Qrfxgbc\Sversbk.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\Choyvp\Qrfxgbc\Nqbor Npebong.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{9R3995NO-1S9P-4S13-O827-48O24O6P7174}\GnfxOne\Svyr Rkcybere.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{0139Q44R-6NSR-49S2-8690-3QNSPNR6SSO8}\Rkpry.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\wbarf\Qrfxgbc\Rkpry 2016.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
P:\Hfref\wbarf\Qrfxgbc\Rkpry.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
{N77S5Q77-2R2O-44P3-N6N2-NON601054N51}\Flfgrz Gbbyf\Pbzznaq Cebzcg.yax
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
P:\Hfref\wbarf\NccQngn\Ybpny\Grzc\2SOR.rkr
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\OneDrive\Accounts
LastUpdate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\BD9E_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 342 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
C000400000
direct allocation
page read and write
malicious
40B1000
unclassified section
page read and write
malicious
26F0000
direct allocation
page read and write
malicious
7FF65BBF0000
unkown
page readonly
malicious
40B1000
unclassified section
page read and write
malicious
29E0000
trusted library section
page read and write
malicious
4E40000
trusted library section
page read and write
malicious
4090000
direct allocation
page read and write
malicious
7FF65BBF0000
unkown
page readonly
malicious
3136000
trusted library allocation
page read and write
A8B3FFE000
stack
page read and write
9F9C000
stack
page read and write
2C9A000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF65BBEE000
unkown
page write copy
3030000
unkown
page read and write
B330000
unkown
page read and write
3030000
unkown
page read and write
7FFD9B8AB000
trusted library allocation
page execute and read and write
3020000
unkown
page read and write
3156000
trusted library allocation
page read and write
2AC4000
trusted library allocation
page read and write
3010000
unkown
page read and write
6000000
trusted library allocation
page read and write
5E5000
heap
page read and write
87C0000
unkown
page read and write
1DCCE994000
trusted library allocation
page read and write
5BA0000
trusted library allocation
page read and write
7FF5ED975000
unkown
page readonly
2AFC000
trusted library allocation
page read and write
1DCCE4B5000
trusted library allocation
page read and write
1DCCC45C000
heap
page read and write
3050000
unkown
page read and write
4280000
heap
page read and write
3030000
unkown
page read and write
3032000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
4FA4000
trusted library allocation
page read and write
8BE9000
stack
page read and write
3030000
unkown
page read and write
15BDB1BA000
trusted library allocation
page read and write
3353000
trusted library allocation
page read and write
A491000
unkown
page read and write
3050000
unkown
page read and write
4E84000
trusted library allocation
page read and write
7FE08000
trusted library allocation
page execute and read and write
3130000
trusted library allocation
page read and write
218E000
stack
page read and write
2FBA000
heap
page read and write
2EC2E78B000
trusted library allocation
page read and write
2B0D000
trusted library allocation
page read and write
FEECBFD000
stack
page read and write
9AC0000
unkown
page read and write
9C000
stack
page read and write
3344000
trusted library allocation
page read and write
3030000
unkown
page read and write
7978000
unkown
page read and write
2B34000
trusted library allocation
page read and write
4EE0000
trusted library allocation
page read and write
7FF5ED4BB000
unkown
page readonly
6020000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
C00001A000
direct allocation
page read and write
1DCE7AA2000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
9875000
unkown
page read and write
2B24000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
2B7E000
stack
page read and write
B330000
unkown
page read and write
24BF000
stack
page read and write
2EC2F6FA000
trusted library allocation
page read and write
54EF000
heap
page read and write
2FA0000
heap
page read and write
3ABB7FE000
stack
page read and write
B330000
unkown
page read and write
626C000
stack
page read and write
3050000
unkown
page read and write
275A5270000
heap
page read and write
2A21000
trusted library allocation
page read and write
2C5B000
trusted library allocation
page read and write
7FFD9B8DC000
trusted library allocation
page execute and read and write
4FA4000
trusted library allocation
page read and write
9A60000
unkown
page read and write
F56C8FD000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FF5ED9AE000
unkown
page readonly
2A1A000
trusted library allocation
page read and write
AAF2000
unkown
page read and write
5CD0000
trusted library allocation
page read and write
2A93000
trusted library allocation
page read and write
C00037E000
direct allocation
page read and write
54C1000
heap
page read and write
2B28000
trusted library allocation
page read and write
14B0000
unkown
page readonly
47F0000
heap
page read and write
79B1000
unkown
page read and write
2F9F000
heap
page read and write
3047000
heap
page read and write
2B2B000
trusted library allocation
page read and write
3210000
unkown
page read and write
3047000
heap
page read and write
6000000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
2EC467B7000
heap
page read and write
335A000
trusted library allocation
page read and write
1DCCE490000
trusted library allocation
page read and write
6CA60000
unkown
page readonly
C00032D000
direct allocation
page read and write
1DCCE4B7000
trusted library allocation
page read and write
4F73000
trusted library allocation
page read and write
2A83000
trusted library allocation
page read and write
3030000
unkown
page read and write
3120000
trusted library allocation
page read and write
3016000
heap
page read and write
314F000
trusted library allocation
page read and write
C4D0000
unkown
page read and write
54C1000
heap
page read and write
15BDAF40000
heap
page execute and read and write
2570000
heap
page read and write
2A89000
trusted library allocation
page read and write
2C50000
trusted library allocation
page read and write
5557000
stack
page read and write
1DCE9816000
heap
page read and write
2AA8000
trusted library allocation
page read and write
3030000
unkown
page read and write
3047000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
44C000
trusted library allocation
page execute and read and write
3050000
unkown
page read and write
335A000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
2FB8000
heap
page read and write
300D000
heap
page read and write
7FF5ED8B4000
unkown
page readonly
FE02000
heap
page read and write
2961000
trusted library allocation
page read and write
26F0000
direct allocation
page read and write
A4AE000
unkown
page read and write
7FFD9BC08000
trusted library allocation
page read and write
3032000
heap
page read and write
303E000
heap
page read and write
C000050000
direct allocation
page read and write
1DCE8120000
heap
page read and write
1DCE813B000
heap
page read and write
4B78000
unkown
page read and write
600F000
stack
page read and write
3460000
unkown
page read and write
C49E000
stack
page read and write
2FA4000
heap
page read and write
A09C000
stack
page read and write
2B6E000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
3170000
unkown
page read and write
1E64A8C0000
heap
page read and write
1DCE9858000
heap
page read and write
2EC2EF61000
trusted library allocation
page read and write
2FA4000
heap
page read and write
2BF5000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
1370000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED87D000
unkown
page readonly
4F64000
trusted library allocation
page read and write
1ABF360B000
heap
page read and write
3123000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
2B7E000
trusted library allocation
page read and write
331E000
stack
page read and write
4A5E000
stack
page read and write
3030000
unkown
page read and write
614000
heap
page read and write
7FF5ED743000
unkown
page readonly
28BD000
stack
page read and write
B370000
unkown
page read and write
7FFD9BA60000
trusted library allocation
page read and write
3027000
heap
page read and write
3156000
trusted library allocation
page read and write
7FF5EDA11000
unkown
page readonly
1DCCC502000
heap
page read and write
7FF5ED28E000
unkown
page readonly
3040000
unkown
page read and write
7FF5ED286000
unkown
page readonly
F56C672000
stack
page read and write
2CDD000
trusted library allocation
page read and write
22966320000
heap
page read and write
335A000
trusted library allocation
page read and write
26AE000
stack
page read and write
3042000
heap
page read and write
3030000
unkown
page read and write
B82A000
stack
page read and write
7D80000
unkown
page read and write
1370000
unkown
page read and write
1DCDE089000
trusted library allocation
page read and write
C00017A000
direct allocation
page read and write
3030000
unkown
page read and write
27F0000
heap
page read and write
3FF1000
unclassified section
page readonly
7FFD9BC47000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
1DCE9808000
heap
page read and write
7FF5ED9D2000
unkown
page readonly
3034000
heap
page read and write
3460000
unkown
page read and write
4F63000
trusted library allocation
page read and write
1ABF4F80000
heap
page read and write
B330000
unkown
page read and write
2BD5000
trusted library allocation
page read and write
53A000
heap
page read and write
1A460B7F000
direct allocation
page read and write
F56C6FD000
stack
page read and write
7FF764861000
unkown
page execute read
9AA0000
unkown
page read and write
18A0000
unkown
page readonly
517E000
stack
page read and write
5F3000
heap
page read and write
3030000
unkown
page read and write
7E11000
unkown
page read and write
405000
unkown
page readonly
1DCCC489000
heap
page read and write
4C60000
unkown
page read and write
2C92000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
3030000
unkown
page read and write
4F5000
heap
page read and write
1DCCC3F0000
heap
page read and write
3030000
unkown
page read and write
2A70000
trusted library allocation
page read and write
8208000
stack
page read and write
2CFF000
stack
page read and write
335A000
trusted library allocation
page read and write
400000
unkown
page readonly
3A4C000
trusted library allocation
page read and write
2710000
heap
page read and write
2BF0000
trusted library allocation
page read and write
2AC3000
trusted library allocation
page read and write
1DCCC5A0000
trusted library allocation
page read and write
B370000
unkown
page read and write
2F9E000
heap
page read and write
446000
trusted library allocation
page execute and read and write
312F000
trusted library allocation
page read and write
275A54B5000
heap
page read and write
4DDE000
stack
page read and write
923E000
stack
page read and write
2EC2E4A6000
trusted library allocation
page read and write
27C8000
trusted library allocation
page read and write
1DCCE760000
trusted library allocation
page read and write
2AD9000
trusted library allocation
page read and write
3139000
trusted library allocation
page read and write
2630000
trusted library allocation
page read and write
3030000
unkown
page read and write
2AF2000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
C88B000
unkown
page read and write
3125000
trusted library allocation
page read and write
7FF5ED97E000
unkown
page readonly
F56CBB8000
stack
page read and write
15BF37E0000
heap
page read and write
1ABF3600000
heap
page read and write
7FF5ED1EB000
unkown
page readonly
3700000
unkown
page read and write
2EC46110000
trusted library allocation
page read and write
B370000
unkown
page read and write
7FF5ED803000
unkown
page readonly
7FFD9B930000
trusted library allocation
page read and write
3356000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
1DCE80C0000
heap
page read and write
9A60000
unkown
page read and write
7FFD9BC90000
trusted library allocation
page read and write
C8E1000
unkown
page read and write
2F9E000
heap
page read and write
2BBB000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
1370000
unkown
page read and write
1451000
unkown
page readonly
7DB0000
unkown
page read and write
3042000
heap
page read and write
293C000
stack
page read and write
F56CCB8000
stack
page read and write
5D01000
heap
page read and write
15BD94E0000
heap
page read and write
C00011E000
direct allocation
page read and write
BDA0000
unkown
page readonly
7FFD9B893000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
29FD000
trusted library allocation
page read and write
1370000
unkown
page read and write
336A000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
3348000
trusted library allocation
page read and write
303A000
heap
page read and write
2F4D000
stack
page read and write
41F000
unkown
page readonly
2B78000
trusted library allocation
page read and write
7FF65C1AB000
unkown
page read and write
7FFD9BA2E000
trusted library allocation
page read and write
2EC2C300000
heap
page read and write
7FF5ED5A8000
unkown
page readonly
5B90000
trusted library allocation
page read and write
402000
unkown
page readonly
1240000
heap
page read and write
2CEC000
trusted library allocation
page read and write
3170000
unkown
page read and write
2B22000
trusted library allocation
page read and write
2CAB000
trusted library allocation
page read and write
3132000
trusted library allocation
page read and write
20A568FB000
heap
page read and write
C0003AC000
direct allocation
page read and write
9A60000
unkown
page read and write
2EC2F154000
trusted library allocation
page read and write
3420000
unkown
page read and write
27C0000
trusted library allocation
page read and write
C000374000
direct allocation
page read and write
3030000
unkown
page read and write
3030000
unkown
page read and write
7DD0000
unkown
page read and write
3030000
unkown
page read and write
2CCC000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
9A10000
unkown
page read and write
15BD9607000
heap
page read and write
613000
heap
page read and write
4F48000
trusted library allocation
page read and write
3170000
unkown
page read and write
54C0000
trusted library allocation
page read and write
C00019C000
direct allocation
page read and write
6CA28000
unkown
page readonly
1DCCE0FE000
trusted library allocation
page read and write
FC24000
unkown
page read and write
7FFD9B8BC000
trusted library allocation
page execute and read and write
3010000
unkown
page read and write
A361000
unkown
page read and write
7FFD9B966000
trusted library allocation
page execute and read and write
3420000
unkown
page read and write
7E70000
unkown
page read and write
335A000
trusted library allocation
page read and write
3168000
trusted library allocation
page read and write
B330000
unkown
page read and write
2B57000
trusted library allocation
page read and write
20A56908000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
3170000
unkown
page read and write
2F9E000
heap
page read and write
26C8000
stack
page read and write
7DF4F3030000
unkown
page readonly
1DCE6890000
heap
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
7FF65BB53000
unkown
page write copy
70A000
stack
page read and write
C000116000
direct allocation
page read and write
A29E000
stack
page read and write
A8B33FE000
stack
page read and write
986F000
unkown
page read and write
7FF65B6B1000
unkown
page execute read
7DB0000
unkown
page read and write
2767000
unclassified section
page read and write
7FF5ED7F1000
unkown
page readonly
4F44000
trusted library allocation
page read and write
3420000
unkown
page read and write
C0003CE000
direct allocation
page read and write
7FF65C21E000
unkown
page read and write
5BCE000
stack
page read and write
2C8C000
trusted library allocation
page read and write
3129000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
15BDAF20000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
2B26000
trusted library allocation
page read and write
9A60000
unkown
page read and write
405000
unkown
page readonly
2EC461DF000
heap
page read and write
7FF5ED1D7000
unkown
page readonly
3420000
unkown
page read and write
3016000
heap
page read and write
2AD9000
trusted library allocation
page read and write
303F000
heap
page read and write
2AA4000
trusted library allocation
page read and write
2A25000
trusted library allocation
page read and write
3590000
unkown
page read and write
2B91000
trusted library allocation
page read and write
2EC2C330000
trusted library section
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
143B000
stack
page read and write
1E64A980000
heap
page read and write
2C2B000
trusted library allocation
page read and write
2AD5000
trusted library allocation
page read and write
2A33000
trusted library allocation
page read and write
7FD67FF000
stack
page read and write
5E1000
heap
page read and write
3044000
heap
page read and write
300D000
heap
page read and write
2EC3E0E1000
trusted library allocation
page read and write
20A583D2000
heap
page read and write
3030000
unkown
page read and write
1230000
unkown
page read and write
4E90000
trusted library allocation
page read and write
B330000
unkown
page read and write
A8B598F000
stack
page read and write
7FF5ED77C000
unkown
page readonly
443000
trusted library allocation
page read and write
1370000
unkown
page read and write
3030000
unkown
page read and write
60B15FF000
stack
page read and write
7FF7648ED000
unkown
page readonly
7FF5ED80C000
unkown
page readonly
3116000
trusted library allocation
page read and write
E89E000
stack
page read and write
1A460B5D000
direct allocation
page read and write
7857000
unkown
page read and write
2A37000
trusted library allocation
page read and write
3363000
trusted library allocation
page read and write
7FF5ED73D000
unkown
page readonly
336A000
trusted library allocation
page read and write
3026000
heap
page read and write
2EC2E4AA000
trusted library allocation
page read and write
2B3B000
trusted library allocation
page read and write
3030000
unkown
page read and write
335A000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
B650000
unkown
page read and write
3F9D000
stack
page read and write
1370000
unkown
page read and write
F56CF3C000
stack
page read and write
2B13000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
3129000
trusted library allocation
page read and write
1370000
unkown
page read and write
7DB0000
unkown
page read and write
304E000
heap
page read and write
9A60000
unkown
page read and write
7FF5ED9ED000
unkown
page readonly
2B5F000
trusted library allocation
page read and write
1DCCC6F0000
heap
page read and write
1DCCE4AB000
trusted library allocation
page read and write
1A460C10000
direct allocation
page read and write
2EC3E13C000
trusted library allocation
page read and write
3050000
unkown
page read and write
3ABA7FE000
stack
page read and write
9A60000
unkown
page read and write
2A12000
trusted library allocation
page read and write
C10A000
stack
page read and write
7FF5ED5C9000
unkown
page readonly
9B00000
unkown
page read and write
4F9E000
trusted library allocation
page read and write
41F000
unkown
page readonly
36B8000
trusted library allocation
page read and write
2FA4000
heap
page read and write
A8B0FFE000
stack
page read and write
3044000
heap
page read and write
2BBF000
trusted library allocation
page read and write
3170000
unkown
page read and write
2C07000
trusted library allocation
page read and write
2A91000
trusted library allocation
page read and write
3362000
trusted library allocation
page read and write
3080000
unkown
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
3170000
unkown
page read and write
2B7E000
trusted library allocation
page read and write
15BF4B40000
heap
page read and write
3420000
unkown
page read and write
3170000
unkown
page read and write
1440000
unkown
page read and write
2B48000
trusted library allocation
page read and write
1DCCE388000
trusted library allocation
page read and write
4F5D000
trusted library allocation
page read and write
3170000
unkown
page read and write
3420000
unkown
page read and write
2ABF000
trusted library allocation
page read and write
7FF65BB4B000
unkown
page write copy
78AD000
unkown
page read and write
7FFD9B916000
trusted library allocation
page read and write
2AEA000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
B330000
unkown
page read and write
3020000
unkown
page read and write
C0003B2000
direct allocation
page read and write
3010000
unkown
page read and write
B983FF000
stack
page read and write
4F92000
trusted library allocation
page read and write
3430000
unkown
page read and write
2F8B000
heap
page read and write
A8B23FF000
stack
page read and write
3130000
trusted library allocation
page read and write
2B68000
trusted library allocation
page read and write
3170000
unkown
page read and write
1DCDE071000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
275A54B0000
heap
page read and write
335B000
trusted library allocation
page read and write
2C35000
trusted library allocation
page read and write
4F8C000
trusted library allocation
page read and write
4BC9000
unkown
page read and write
C00008C000
direct allocation
page read and write
7FF5EDA0B000
unkown
page readonly
3030000
unkown
page read and write
B330000
unkown
page read and write
B989FF000
stack
page read and write
2ABD000
trusted library allocation
page read and write
7D90000
unkown
page read and write
7FF5ED68F000
unkown
page readonly
20A584E8000
heap
page read and write
2B74000
trusted library allocation
page read and write
4F94000
trusted library allocation
page read and write
1370000
unkown
page read and write
15BD94D0000
heap
page read and write
DD0000
unkown
page readonly
2C90000
trusted library allocation
page read and write
896B000
stack
page read and write
3034000
heap
page read and write
7DC0000
unkown
page read and write
7FF5ED6B9000
unkown
page readonly
7FFD9BB50000
trusted library allocation
page read and write
4C1E000
unkown
page read and write
239F000
stack
page read and write
1DCCC650000
heap
page read and write
7DC0000
unkown
page read and write
7DC0000
unkown
page read and write
791000
remote allocation
page execute and read and write
594000
heap
page read and write
7FF65BBEC000
unkown
page read and write
7FF5ED507000
unkown
page readonly
335A000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
C000066000
direct allocation
page read and write
25D8000
stack
page read and write
335A000
trusted library allocation
page read and write
C6CF000
unkown
page read and write
1E64A6DA000
heap
page read and write
1480000
heap
page read and write
300D000
heap
page read and write
3170000
unkown
page read and write
18D000
trusted library allocation
page execute and read and write
3030000
unkown
page read and write
7FF764860000
unkown
page readonly
3030000
unkown
page read and write
6030000
trusted library allocation
page read and write
97A9000
unkown
page read and write
7FFD9B946000
trusted library allocation
page execute and read and write
3020000
unkown
page read and write
4F5D000
trusted library allocation
page read and write
2CC4000
trusted library allocation
page read and write
2EC2F356000
trusted library allocation
page read and write
2EC3E3CA000
trusted library allocation
page read and write
1370000
unkown
page read and write
2EC464AF000
heap
page read and write
5BA0000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
15BDB0F0000
trusted library section
page readonly
20A58401000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
3420000
unkown
page read and write
3030000
unkown
page read and write
15BD958D000
heap
page read and write
3170000
unkown
page read and write
3010000
unkown
page read and write
3034000
heap
page read and write
9550000
unkown
page readonly
2FFE000
stack
page read and write
4F88000
trusted library allocation
page read and write
3460000
unkown
page read and write
C00027E000
direct allocation
page read and write
7DD0000
unkown
page read and write
3420000
unkown
page read and write
336A000
trusted library allocation
page read and write
3170000
unkown
page read and write
7FF5ED602000
unkown
page readonly
5590000
unkown
page write copy
3030000
unkown
page read and write
7DC0000
unkown
page read and write
580E000
stack
page read and write
9A60000
unkown
page read and write
3170000
unkown
page read and write
313E000
trusted library allocation
page read and write
5641000
unkown
page read and write
7FF764952000
unkown
page read and write
7FF5ED8E7000
unkown
page readonly
9A60000
unkown
page read and write
3220000
unkown
page readonly
1DCDE0EB000
trusted library allocation
page read and write
2C1E000
trusted library allocation
page read and write
7D80000
unkown
page read and write
2B55000
trusted library allocation
page read and write
4CE0000
unkown
page read and write
C000036000
direct allocation
page read and write
3420000
unkown
page read and write
4FAC000
trusted library allocation
page read and write
3169000
trusted library allocation
page read and write
15BD98D5000
heap
page read and write
336A000
trusted library allocation
page read and write
7D80000
unkown
page read and write
22966390000
heap
page read and write
3116000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
7B80000
unkown
page read and write
7FDF0000
trusted library allocation
page execute and read and write
334B000
trusted library allocation
page read and write
2AFF000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
7FFD9B93C000
trusted library allocation
page execute and read and write
7DF4F3031000
unkown
page execute read
2D70000
heap
page read and write
2AAC000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
3420000
unkown
page read and write
509D000
trusted library allocation
page read and write
3031000
heap
page read and write
7FF5ED990000
unkown
page readonly
2EC2C420000
heap
page read and write
3032000
heap
page read and write
3420000
unkown
page read and write
28F83000000
heap
page read and write
2BEC000
trusted library allocation
page read and write
300D000
heap
page read and write
3170000
unkown
page read and write
C0000B4000
direct allocation
page read and write
3030000
unkown
page read and write
29CF000
stack
page read and write
7DC0000
unkown
page read and write
7FF5ED8AC000
unkown
page readonly
1DCE6910000
heap
page read and write
54C0000
trusted library allocation
page read and write
3030000
unkown
page read and write
7950000
unkown
page read and write
B370000
unkown
page read and write
1DCE7EAF000
heap
page read and write
A8B13FE000
stack
page read and write
3038000
heap
page read and write
5636000
heap
page read and write
B330000
unkown
page read and write
7FF5ED8F9000
unkown
page readonly
423000
unkown
page read and write
310C000
trusted library allocation
page read and write
3016000
heap
page read and write
9A60000
unkown
page read and write
7FFD9BB10000
trusted library allocation
page read and write
1DCE8136000
heap
page read and write
2A96000
trusted library allocation
page read and write
29EE000
stack
page read and write
9795000
unkown
page read and write
336A000
trusted library allocation
page read and write
2B13000
trusted library allocation
page read and write
2AAA000
trusted library allocation
page read and write
3173000
trusted library allocation
page read and write
2B63000
trusted library allocation
page read and write
F56CE3E000
stack
page read and write
486000
heap
page read and write
7FFD9BD70000
trusted library allocation
page execute and read and write
56E000
stack
page read and write
1DCCC670000
heap
page read and write
335A000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
7FF5ED670000
unkown
page readonly
227F000
stack
page read and write
7FF5ED5C1000
unkown
page readonly
37F2000
unkown
page read and write
2BCC000
trusted library allocation
page read and write
2BC7000
trusted library allocation
page read and write
7FFD9B86D000
trusted library allocation
page execute and read and write
22BE000
stack
page read and write
2EC2F956000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
301C000
heap
page read and write
410000
heap
page read and write
1A460C60000
direct allocation
page read and write
B330000
unkown
page read and write
C507000
unkown
page read and write
96DF000
unkown
page read and write
7FF5ED40D000
unkown
page readonly
FD2B000
unkown
page read and write
3359000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
4F8B000
trusted library allocation
page read and write
BAF9000
stack
page read and write
2EC465EE000
heap
page read and write
C6C9000
unkown
page read and write
2610000
trusted library section
page read and write
274E000
stack
page read and write
B370000
unkown
page read and write
3030000
unkown
page read and write
27EE000
stack
page read and write
4F40000
trusted library allocation
page read and write
F56DB4F000
stack
page read and write
2600000
trusted library section
page read and write
3030000
unkown
page read and write
B8B0000
unkown
page read and write
C00030B000
direct allocation
page read and write
8A6E000
stack
page read and write
7FF5ED516000
unkown
page readonly
7FFD9BAE0000
trusted library allocation
page read and write
3025000
heap
page read and write
79FB000
unkown
page read and write
B330000
unkown
page read and write
2EC30071000
trusted library allocation
page read and write
3010000
unkown
page read and write
311D000
trusted library allocation
page read and write
4090000
direct allocation
page read and write
311B000
trusted library allocation
page read and write
3420000
unkown
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1A41B8A8000
direct allocation
page read and write
3010000
unkown
page read and write
2EC2C3F0000
trusted library allocation
page read and write
7FF5ED342000
unkown
page readonly
785D000
unkown
page read and write
1370000
unkown
page read and write
215F000
stack
page read and write
1DCCC6FD000
heap
page read and write
2BDA000
trusted library allocation
page read and write
2FB8000
heap
page read and write
20A56880000
heap
page read and write
7FF5ED41C000
unkown
page readonly
3420000
unkown
page read and write
334E000
trusted library allocation
page read and write
3150000
unkown
page read and write
3122000
trusted library allocation
page read and write
7D80000
unkown
page read and write
1E64A984000
heap
page read and write
336A000
trusted library allocation
page read and write
C0002DC000
direct allocation
page read and write
7FF5ED295000
unkown
page readonly
7FFD9B8AB000
trusted library allocation
page execute and read and write
3030000
unkown
page read and write
7FF65BBEE000
unkown
page write copy
3FA1000
unclassified section
page execute read
97B5000
unkown
page read and write
3420000
unkown
page read and write
54C4000
heap
page read and write
2B4D000
trusted library allocation
page read and write
B330000
unkown
page read and write
9815000
unkown
page read and write
9A60000
unkown
page read and write
2700000
remote allocation
page read and write
2A03000
trusted library allocation
page read and write
2BD1000
trusted library allocation
page read and write
3030000
unkown
page read and write
9881000
unkown
page read and write
3010000
unkown
page read and write
314F000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
2296639A000
heap
page read and write
4131000
heap
page read and write
7D80000
unkown
page read and write
2F78000
heap
page read and write
2A22000
trusted library allocation
page read and write
2FA4000
heap
page read and write
9877000
unkown
page read and write
54E000
stack
page read and write
2D77000
heap
page read and write
1A460B85000
direct allocation
page read and write
312A000
trusted library allocation
page read and write
7FF5ED8A4000
unkown
page readonly
401000
unkown
page execute read
A8B698D000
stack
page read and write
3030000
unkown
page read and write
29F9000
trusted library allocation
page read and write
3158000
trusted library allocation
page read and write
7FF5ED1F1000
unkown
page readonly
7D90000
unkown
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
1DCCE3A6000
trusted library allocation
page read and write
7FF5ED844000
unkown
page readonly
1370000
unkown
page read and write
3155000
trusted library allocation
page read and write
B97FFC000
stack
page read and write
AADB000
unkown
page read and write
3209000
stack
page read and write
3580000
unkown
page readonly
C0002C8000
direct allocation
page read and write
1E64A8E0000
heap
page read and write
5B90000
trusted library allocation
page read and write
4F5B000
trusted library allocation
page read and write
60B14FF000
unkown
page read and write
9A5B000
unkown
page read and write
97C3000
unkown
page read and write
2EC467E1000
heap
page read and write
3039000
heap
page read and write
C000302000
direct allocation
page read and write
1DCE816D000
heap
page read and write
1DCCDEAD000
heap
page read and write
2B31000
trusted library allocation
page read and write
1DCCC420000
heap
page read and write
9A60000
unkown
page read and write
3030000
unkown
page read and write
9A60000
unkown
page read and write
2EC2E2F7000
trusted library allocation
page read and write
1370000
unkown
page read and write
7DD0000
unkown
page read and write
3420000
unkown
page read and write
3374000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
C000192000
direct allocation
page read and write
7FFD9B883000
trusted library allocation
page execute and read and write
B370000
unkown
page read and write
3019000
heap
page read and write
3037000
heap
page read and write
275A5250000
heap
page read and write
271A000
heap
page read and write
2EC2F78B000
trusted library allocation
page read and write
3420000
unkown
page read and write
2728000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
7DB0000
unkown
page read and write
2BD3000
trusted library allocation
page read and write
3037000
heap
page read and write
314E000
trusted library allocation
page read and write
B370000
unkown
page read and write
CB2E000
unkown
page read and write
A8B43FE000
stack
page read and write
E51C000
stack
page read and write
2B70000
trusted library allocation
page read and write
3049000
heap
page read and write
A8B27FE000
stack
page read and write
7FF5ED4C6000
unkown
page readonly
29F7000
trusted library allocation
page read and write
7FFD9BD2B000
trusted library allocation
page read and write
A8AFC6E000
stack
page read and write
AB63000
unkown
page read and write
7E70000
unkown
page read and write
57D0000
trusted library allocation
page read and write
9A60000
unkown
page read and write
10C0000
unkown
page readonly
3420000
unkown
page read and write
1E64A7E0000
heap
page read and write
3420000
unkown
page read and write
B4D0000
unkown
page read and write
3460000
unkown
page read and write
9AA0000
unkown
page read and write
269F000
stack
page read and write
3352000
trusted library allocation
page read and write
56E000
heap
page read and write
3122000
trusted library allocation
page read and write
3030000
unkown
page read and write
1F0000
heap
page read and write
9AA0000
unkown
page read and write
3168000
trusted library allocation
page read and write
3030000
unkown
page read and write
3362000
trusted library allocation
page read and write
1DCE60A0000
trusted library allocation
page read and write
A364000
unkown
page read and write
3010000
unkown
page read and write
1370000
unkown
page read and write
7E50000
unkown
page readonly
7FF5ED91A000
unkown
page readonly
2B63000
trusted library allocation
page read and write
2761000
unclassified section
page write copy
4CC0000
unkown
page read and write
2FA4000
heap
page read and write
7FF65BBE3000
unkown
page write copy
2C24000
trusted library allocation
page read and write
C0001A6000
direct allocation
page read and write
3019000
heap
page read and write
3348000
trusted library allocation
page read and write
400000
unkown
page readonly
2CD1000
trusted library allocation
page read and write
2BE7000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
1370000
unkown
page read and write
3030000
unkown
page read and write
2BBC000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
3131000
trusted library allocation
page read and write
8710000
unkown
page readonly
20A568FD000
heap
page read and write
3420000
unkown
page read and write
312F000
trusted library allocation
page read and write
2EC2C24E000
heap
page read and write
1A460D81000
direct allocation
page read and write
3420000
unkown
page read and write
4F4F000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3030000
unkown
page read and write
3030000
unkown
page read and write
311E000
trusted library allocation
page read and write
40D0000
heap
page read and write
3150000
unkown
page read and write
2FA4000
heap
page read and write
7C90000
unkown
page read and write
A8B718B000
stack
page read and write
7FF5ED86B000
unkown
page readonly
C000305000
direct allocation
page read and write
5CD0000
trusted library allocation
page read and write
3170000
unkown
page read and write
3178000
trusted library allocation
page read and write
6CAAB000
unkown
page read and write
3030000
unkown
page read and write
2FD9000
heap
page read and write
3341000
trusted library allocation
page read and write
3010000
heap
page read and write
87C0000
unkown
page read and write
C0002B2000
direct allocation
page read and write
C000134000
direct allocation
page read and write
7FFD9B8A4000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
3153000
trusted library allocation
page read and write
1DCE984F000
heap
page read and write
1A41B785000
heap
page read and write
C0000CE000
direct allocation
page read and write
1370000
unkown
page read and write
3430000
unkown
page read and write
7FFD9BA4B000
trusted library allocation
page read and write
2BFF000
trusted library allocation
page read and write
2EC46490000
heap
page read and write
2A4A000
trusted library allocation
page read and write
FCE4000
unkown
page read and write
7FF5ED8C6000
unkown
page readonly
2CA1000
trusted library allocation
page read and write
C0000CA000
direct allocation
page read and write
15BD9546000
heap
page read and write
3030000
unkown
page read and write
5F9000
heap
page read and write
3153000
trusted library allocation
page read and write
C000070000
direct allocation
page read and write
26E0000
trusted library allocation
page execute and read and write
4F9C000
trusted library allocation
page read and write
4F93000
trusted library allocation
page read and write
4F77000
trusted library allocation
page read and write
1DCCE918000
trusted library allocation
page read and write
4E8E000
trusted library allocation
page read and write
3030000
unkown
page read and write
1505000
heap
page read and write
9F1E000
stack
page read and write
3420000
unkown
page read and write
401000
unkown
page execute read
2448000
unkown
page readonly
7FFD9BB10000
trusted library allocation
page read and write
5DCF000
stack
page read and write
3033000
heap
page read and write
3040000
unkown
page read and write
C000394000
direct allocation
page read and write
2C75000
trusted library allocation
page read and write
C00095A000
direct allocation
page read and write
7F30000
unkown
page read and write
3030000
unkown
page read and write
9A60000
unkown
page read and write
1A460B89000
direct allocation
page read and write
6CA98000
unkown
page readonly
2EC461FE000
heap
page read and write
7FF5EDA14000
unkown
page readonly
313E000
trusted library allocation
page read and write
2F81000
heap
page read and write
3173000
trusted library allocation
page read and write
906E000
stack
page read and write
3031000
heap
page read and write
3025000
heap
page read and write
3420000
unkown
page read and write
431000
unkown
page read and write
6CAAC000
unkown
page write copy
511D000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page read and write
E69E000
stack
page read and write
7FF5ED556000
unkown
page readonly
3030000
unkown
page read and write
2EC2DF1F000
heap
page read and write
FE0A000
heap
page read and write
F56D98D000
stack
page read and write
5B90000
trusted library allocation
page read and write
1A41B780000
heap
page read and write
2EC3E0D1000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
4F9B000
trusted library allocation
page read and write
4E92000
trusted library allocation
page read and write
3011000
heap
page read and write
2B4A000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
1A41B750000
heap
page read and write
1A460DE0000
direct allocation
page read and write
6020000
trusted library allocation
page read and write
3136000
trusted library allocation
page read and write
3022000
heap
page read and write
3420000
unkown
page read and write
5F3D000
stack
page read and write
4E80000
trusted library allocation
page read and write
2A3C000
trusted library allocation
page read and write
C893000
unkown
page read and write
1A460D30000
direct allocation
page read and write
238F000
stack
page read and write
28F849A0000
heap
page read and write
A8B758C000
stack
page read and write
5D8000
heap
page read and write
2EC2C425000
heap
page read and write
3348000
trusted library allocation
page read and write
400000
unkown
page readonly
7FF65BB52000
unkown
page read and write
1370000
unkown
page read and write
9A60000
unkown
page read and write
2550000
heap
page read and write
C000088000
direct allocation
page read and write
2EC46863000
heap
page read and write
2A35000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3460000
unkown
page read and write
7DD0000
unkown
page read and write
3020000
unkown
page read and write
6CA3B000
unkown
page read and write
3030000
unkown
page read and write
7FF5ED4FD000
unkown
page readonly
3420000
unkown
page read and write
22966560000
heap
page read and write
3172000
trusted library allocation
page read and write
2A76000
trusted library allocation
page read and write
20A56A70000
heap
page read and write
9798000
unkown
page read and write
9A60000
unkown
page read and write
C00012C000
direct allocation
page read and write
35A0000
trusted library allocation
page read and write
B330000
unkown
page read and write
79D3000
unkown
page read and write
6C9F0000
unkown
page readonly
4150000
heap
page read and write
7FF65C22A000
unkown
page write copy
2B4E000
trusted library allocation
page read and write
3030000
unkown
page read and write
2B9A000
trusted library allocation
page read and write
400000
unkown
page readonly
4140000
heap
page read and write
3FE7000
unclassified section
page read and write
3030000
unkown
page read and write
20A584E9000
heap
page read and write
3030000
unkown
page read and write
301E000
heap
page read and write
2ADD000
trusted library allocation
page read and write
7FF7648ED000
unkown
page readonly
47BE000
stack
page read and write
3170000
unkown
page read and write
3350000
trusted library allocation
page read and write
7FF5ED4B0000
unkown
page readonly
7D90000
unkown
page read and write
1490000
unkown
page read and write
3170000
unkown
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
3420000
unkown
page read and write
3659000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
3460000
unkown
page read and write
3420000
unkown
page read and write
3460000
unkown
page read and write
2BA3000
trusted library allocation
page read and write
2EC46839000
heap
page read and write
2A8D000
trusted library allocation
page read and write
7FF764861000
unkown
page execute read
5B90000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
6CA61000
unkown
page execute read
5F3000
heap
page read and write
60000
direct allocation
page execute and read and write
3134000
trusted library allocation
page read and write
9A60000
unkown
page read and write
1DCE6900000
heap
page read and write
1370000
unkown
page read and write
2FA4000
heap
page read and write
7DD0000
unkown
page read and write
2690000
trusted library allocation
page read and write
258D000
heap
page execute and read and write
1E64A6FA000
heap
page read and write
2CCA000
trusted library allocation
page read and write
5F8000
heap
page read and write
1370000
unkown
page read and write
2B17000
trusted library allocation
page read and write
310F000
trusted library allocation
page read and write
4F76000
trusted library allocation
page read and write
4F45000
trusted library allocation
page read and write
3030000
unkown
page read and write
2B95000
trusted library allocation
page read and write
2AFA000
trusted library allocation
page read and write
2C20000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page read and write
15BF3A35000
heap
page read and write
315E000
trusted library allocation
page read and write
B98BFF000
stack
page read and write
C000348000
direct allocation
page read and write
6000000
trusted library allocation
page read and write
323E000
stack
page read and write
315E000
trusted library allocation
page read and write
9873000
unkown
page read and write
2FA4000
heap
page read and write
4F6B000
trusted library allocation
page read and write
7FF5ED39B000
unkown
page readonly
54C1000
heap
page read and write
3020000
unkown
page read and write
334A000
trusted library allocation
page read and write
2CA3000
trusted library allocation
page read and write
7FF5ED750000
unkown
page readonly
3860000
trusted library allocation
page read and write
308A000
stack
page read and write
3128000
trusted library allocation
page read and write
1DCCC45A000
heap
page read and write
3030000
unkown
page read and write
3166000
trusted library allocation
page read and write
C000090000
direct allocation
page read and write
7FF5ED821000
unkown
page readonly
27B0000
heap
page read and write
FE5A000
unkown
page read and write
CB1B000
unkown
page read and write
3030000
unkown
page read and write
610000
heap
page read and write
302E000
heap
page read and write
301F000
heap
page read and write
311D000
trusted library allocation
page read and write
7FF5EDA53000
unkown
page readonly
303E000
heap
page read and write
336A000
trusted library allocation
page read and write
F56C97E000
stack
page read and write
8EC6000
unkown
page read and write
37AC000
unkown
page read and write
7FFD9B884000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF5ED674000
unkown
page readonly
3010000
unkown
page read and write
26FD000
stack
page read and write
3180000
trusted library allocation
page read and write
3050000
unkown
page read and write
4F51000
trusted library allocation
page read and write
7D80000
unkown
page read and write
7FFD9B88D000
trusted library allocation
page execute and read and write
5FF0000
trusted library allocation
page read and write
40B000
unkown
page execute read
302F000
heap
page read and write
336A000
trusted library allocation
page read and write
4FD4000
trusted library allocation
page read and write
2700000
unclassified section
page read and write
124000
trusted library allocation
page read and write
3037000
heap
page read and write
7FF5ED92C000
unkown
page readonly
2C31000
trusted library allocation
page read and write
2F86000
heap
page read and write
423000
unkown
page read and write
7D80000
unkown
page read and write
10D0000
heap
page read and write
610000
heap
page read and write
5CF0000
trusted library allocation
page read and write
A323000
unkown
page read and write
AA90000
unkown
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
114000
trusted library allocation
page read and write
AAD1000
unkown
page read and write
2B03000
trusted library allocation
page read and write
15BD955C000
heap
page read and write
2A72000
trusted library allocation
page read and write
C54A000
unkown
page read and write
300D000
heap
page read and write
3150000
unkown
page read and write
3420000
unkown
page read and write
5CD0000
trusted library allocation
page read and write
2EC2C2F0000
heap
page read and write
2EC2C320000
trusted library section
page read and write
2BD4000
trusted library allocation
page read and write
4EB2000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
C5A0000
unkown
page read and write
26DE000
stack
page read and write
C000146000
direct allocation
page read and write
4FE3000
trusted library allocation
page read and write
7FD6CFF000
stack
page read and write
9977000
unkown
page read and write
3148000
trusted library allocation
page read and write
28F82FF0000
heap
page read and write
3011000
heap
page read and write
6CA98000
unkown
page readonly
334A000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
C6F4000
unkown
page read and write
7FFD9B87B000
trusted library allocation
page read and write
C561000
unkown
page read and write
2ABA000
trusted library allocation
page read and write
7A34000
unkown
page read and write
19D000
stack
page read and write
4CD0000
unkown
page read and write
3030000
unkown
page read and write
3006000
heap
page read and write
3030000
unkown
page read and write
B370000
unkown
page read and write
5486000
trusted library allocation
page read and write
2BE1000
trusted library allocation
page read and write
7DF4F3040000
unkown
page readonly
3030000
unkown
page read and write
311E000
trusted library allocation
page read and write
1370000
unkown
page read and write
1370000
unkown
page read and write
2CE3000
trusted library allocation
page read and write
7FF5ED669000
unkown
page readonly
C0004DE000
direct allocation
page read and write
3341000
trusted library allocation
page read and write
51E6000
trusted library allocation
page read and write
20A584E5000
heap
page read and write
4E94000
trusted library allocation
page read and write
3170000
unkown
page read and write
7DB0000
unkown
page read and write
3153000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
300D000
heap
page read and write
9ADC000
stack
page read and write
2BEE000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
3030000
unkown
page read and write
35F0000
trusted library allocation
page read and write
20A56903000
heap
page read and write
3170000
unkown
page read and write
3541000
heap
page read and write
5065000
trusted library allocation
page read and write
2BB7000
trusted library allocation
page read and write
1370000
unkown
page read and write
2EC2F116000
trusted library allocation
page read and write
9A60000
unkown
page read and write
440000
trusted library allocation
page read and write
2FA4000
heap
page read and write
3044000
heap
page read and write
3030000
unkown
page read and write
3113000
trusted library allocation
page read and write
76C0000
unkown
page read and write
7884000
unkown
page read and write
5E5000
heap
page read and write
2448000
unkown
page readonly
1370000
unkown
page read and write
4F74000
trusted library allocation
page read and write
3010000
unkown
page read and write
2AE1000
trusted library allocation
page read and write
2A54000
trusted library allocation
page read and write
3030000
unkown
page read and write
4F0000
heap
page read and write
318F000
trusted library allocation
page read and write
3030000
unkown
page read and write
3123000
trusted library allocation
page read and write
7FF5ED996000
unkown
page readonly
3010000
unkown
page read and write
B5AE000
stack
page read and write
9AA0000
unkown
page read and write
311B000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
7FF5ED26E000
unkown
page readonly
7FF5ED9C8000
unkown
page readonly
15BF63D0000
heap
page read and write
2BB9000
trusted library allocation
page read and write
3020000
unkown
page read and write
C00009C000
direct allocation
page read and write
2C96000
trusted library allocation
page read and write
7FF5ED625000
unkown
page readonly
2BCE000
trusted library allocation
page read and write
93BE000
stack
page read and write
7FFD9BC20000
trusted library allocation
page read and write
3420000
unkown
page read and write
1DCCE571000
trusted library allocation
page read and write
7FF5ED349000
unkown
page readonly
300D000
heap
page read and write
7D90000
unkown
page read and write
120000
trusted library allocation
page read and write
8F0000
heap
page read and write
4F77000
trusted library allocation
page read and write
2C39000
trusted library allocation
page read and write
B6A0000
heap
page read and write
7DF44CEE0000
trusted library allocation
page execute and read and write
E79D000
stack
page read and write
37D2000
unkown
page read and write
3168000
trusted library allocation
page read and write
2C05000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
3034000
heap
page read and write
3030000
unkown
page read and write
20A58301000
heap
page read and write
3420000
unkown
page read and write
2EC46113000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
7852000
unkown
page read and write
3030000
unkown
page read and write
302A000
heap
page read and write
3420000
unkown
page read and write
A375000
unkown
page read and write
336A000
trusted library allocation
page read and write
7863000
unkown
page read and write
2BF2000
trusted library allocation
page read and write
530000
heap
page read and write
52AB000
trusted library allocation
page read and write
2EC2C236000
heap
page read and write
FBE4000
unkown
page read and write
504C000
trusted library allocation
page read and write
3125000
trusted library allocation
page read and write
313E000
trusted library allocation
page read and write
6CABE000
unkown
page read and write
300D000
heap
page read and write
7859000
unkown
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
15BDB100000
heap
page execute and read and write
38FC000
stack
page read and write
2B8A000
trusted library allocation
page read and write
A19F000
stack
page read and write
1DCE68F3000
heap
page read and write
3030000
unkown
page read and write
1DCE6A75000
heap
page read and write
BD1D000
stack
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
C92D000
unkown
page read and write
1483000
heap
page read and write
3010000
unkown
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
3020000
unkown
page read and write
987B000
unkown
page read and write
9A60000
unkown
page read and write
C0000A6000
direct allocation
page read and write
7FF5EDA31000
unkown
page readonly
A4AB000
unkown
page read and write
1E64A6FA000
heap
page read and write
7D00000
unkown
page readonly
2B76000
trusted library allocation
page read and write
2940000
heap
page execute and read and write
9A60000
unkown
page read and write
2EC2C340000
trusted library allocation
page read and write
3120000
unkown
page readonly
C000079000
direct allocation
page read and write
7FF5ED451000
unkown
page readonly
9AC0000
unkown
page read and write
3420000
unkown
page read and write
27AF000
stack
page read and write
7FF5ED692000
unkown
page readonly
302E000
heap
page read and write
2EC2FAC9000
trusted library allocation
page read and write
A8B07FE000
stack
page read and write
AB4E000
unkown
page read and write
2CCE000
trusted library allocation
page read and write
FE41000
unkown
page read and write
3010000
unkown
page read and write
3030000
unkown
page read and write
4F6C000
trusted library allocation
page read and write
28EF000
stack
page read and write
335A000
trusted library allocation
page read and write
AB60000
unkown
page read and write
3040000
unkown
page read and write
7FF5ED5CE000
unkown
page readonly
2C3F000
trusted library allocation
page read and write
4F5D000
trusted library allocation
page read and write
3128000
trusted library allocation
page read and write
3050000
unkown
page read and write
2AAF000
trusted library allocation
page read and write
3030000
unkown
page read and write
15BF3A30000
heap
page read and write
2660000
trusted library allocation
page read and write
3420000
unkown
page read and write
4B90000
unkown
page read and write
C6D8000
unkown
page read and write
410000
heap
page read and write
7D80000
unkown
page read and write
CA42000
unkown
page read and write
7FD6DFB000
stack
page read and write
2C1A000
trusted library allocation
page read and write
7FF5ED939000
unkown
page readonly
110000
trusted library allocation
page read and write
3150000
unkown
page read and write
4F96000
trusted library allocation
page read and write
3109000
trusted library allocation
page read and write
B370000
unkown
page read and write
95DC000
stack
page read and write
F56C87E000
stack
page read and write
7FF65BB44000
unkown
page write copy
7FFD9B966000
trusted library allocation
page execute and read and write
55C0000
heap
page read and write
F56DC4C000
stack
page read and write
7FFD9B89D000
trusted library allocation
page execute and read and write
C7C5000
unkown
page read and write
5F4000
heap
page read and write
C5A3000
unkown
page read and write
4FDE000
trusted library allocation
page read and write
1370000
unkown
page read and write
7DF4F3041000
unkown
page execute read
1DCCE49D000
trusted library allocation
page read and write
214F000
stack
page read and write
3030000
unkown
page read and write
982D000
unkown
page read and write
3030000
unkown
page read and write
1ABF35E0000
heap
page read and write
2EF6000
trusted library allocation
page read and write
7FFD9BA11000
trusted library allocation
page read and write
B330000
unkown
page read and write
4FAF000
trusted library allocation
page read and write
C6C1000
unkown
page read and write
160000
heap
page read and write
3030000
unkown
page read and write
3050000
unkown
page read and write
2EC2F8B9000
trusted library allocation
page read and write
1DCCE480000
trusted library allocation
page read and write
FCA6000
unkown
page read and write
A8B0BFE000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
987D000
unkown
page read and write
335A000
trusted library allocation
page read and write
1ABF5170000
heap
page read and write
5040000
heap
page read and write
4E70000
trusted library allocation
page read and write
C6BF000
unkown
page read and write
87C0000
unkown
page read and write
7D80000
unkown
page read and write
3460000
unkown
page read and write
3460000
unkown
page read and write
C962000
unkown
page read and write
3420000
unkown
page read and write
3738000
unkown
page read and write
7FF5ED6DB000
unkown
page readonly
310E000
trusted library allocation
page read and write
3420000
unkown
page read and write
7FF764861000
unkown
page execute read
1A41B730000
heap
page read and write
2CE5000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
7FF5ED71E000
unkown
page readonly
3115000
trusted library allocation
page read and write
3170000
unkown
page read and write
7FFD9B890000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
15BF3880000
heap
page read and write
4E80000
trusted library allocation
page read and write
1A460CA0000
direct allocation
page read and write
3125000
trusted library allocation
page read and write
3030000
unkown
page read and write
A37D000
unkown
page read and write
2F9E000
heap
page read and write
F56DBCD000
stack
page read and write
2EC2F93B000
trusted library allocation
page read and write
B330000
unkown
page read and write
7FF5ED503000
unkown
page readonly
20A5690C000
heap
page read and write
7FF5ED3D0000
unkown
page readonly
2A78000
trusted library allocation
page read and write
1DCE80E0000
heap
page read and write
7FF5ED412000
unkown
page readonly
4EA6000
trusted library allocation
page read and write
87BE000
stack
page read and write
3420000
unkown
page read and write
2ABE000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
C00009A000
direct allocation
page read and write
379F000
stack
page read and write
26BA000
stack
page read and write
3020000
heap
page read and write
A310000
unkown
page read and write
2CA7000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3040000
unkown
page read and write
B370000
unkown
page read and write
30FF000
stack
page read and write
4F49000
trusted library allocation
page read and write
F56CEBB000
stack
page read and write
300D000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FF5ED4EF000
unkown
page readonly
2BBA000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF65BBE5000
unkown
page read and write
9A60000
unkown
page read and write
313F000
trusted library allocation
page read and write
A433000
unkown
page read and write
3410000
unkown
page read and write
2F8B000
heap
page read and write
2EC4650E000
heap
page read and write
3010000
unkown
page read and write
3030000
unkown
page read and write
3460000
unkown
page read and write
3050000
unkown
page read and write
7FF5ED62F000
unkown
page readonly
7FF5ED3CE000
unkown
page readonly
3348000
trusted library allocation
page read and write
3961000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
2C1C000
trusted library allocation
page read and write
A4A1000
unkown
page read and write
7FF5ED43A000
unkown
page readonly
B330000
unkown
page read and write
190000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
C563000
unkown
page read and write
A327000
unkown
page read and write
7FF5ED48A000
unkown
page readonly
20A56916000
heap
page read and write
7DB0000
unkown
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FF5ED779000
unkown
page readonly
7FF5ED961000
unkown
page readonly
20A568A9000
heap
page read and write
7FF5ED9E1000
unkown
page readonly
A4FC000
unkown
page read and write
E71E000
stack
page read and write
89C0000
unkown
page read and write
1DCCC644000
trusted library section
page readonly
336A000
trusted library allocation
page read and write
7D90000
unkown
page read and write
2BA8000
trusted library allocation
page read and write
3030000
unkown
page read and write
B370000
unkown
page read and write
313D000
trusted library allocation
page read and write
AF8D000
stack
page read and write
31A8000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
C000002000
direct allocation
page read and write
B370000
unkown
page read and write
2EC2E4A2000
trusted library allocation
page read and write
3030000
unkown
page read and write
2EC2E150000
trusted library allocation
page read and write
3420000
unkown
page read and write
6040000
trusted library allocation
page read and write
51BF000
stack
page read and write
3358000
trusted library allocation
page read and write
A8B5D8D000
stack
page read and write
7FFD9BAF2000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
3150000
unkown
page read and write
3047000
heap
page read and write
15BD955F000
heap
page read and write
3136000
trusted library allocation
page read and write
2B61000
trusted library allocation
page read and write
1510000
unkown
page readonly
7D90000
unkown
page read and write
316C000
trusted library allocation
page read and write
3030000
unkown
page read and write
1370000
unkown
page read and write
1A41B650000
heap
page read and write
3050000
unkown
page read and write
3030000
unkown
page read and write
9A60000
unkown
page read and write
3010000
unkown
page read and write
7FF65C256000
unkown
page readonly
7FF5ED4E8000
unkown
page readonly
5BE000
stack
page read and write
9B10000
unkown
page read and write
3350000
trusted library allocation
page read and write
3460000
unkown
page read and write
3148000
trusted library allocation
page read and write
7FFD9BA22000
trusted library allocation
page read and write
9E6C000
stack
page read and write
7F40000
unkown
page readonly
259E000
stack
page read and write
1DCCC690000
heap
page read and write
3420000
unkown
page read and write
7FF5ED9BE000
unkown
page readonly
3125000
trusted library allocation
page read and write
5041000
heap
page read and write
9A60000
unkown
page read and write
C000166000
direct allocation
page read and write
2BBD000
trusted library allocation
page read and write
7FF764861000
unkown
page execute read
423000
unkown
page write copy
2AF6000
trusted library allocation
page read and write
C000136000
direct allocation
page read and write
1DCCE4E2000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
2AB8000
trusted library allocation
page read and write
3030000
unkown
page read and write
3030000
unkown
page read and write
9D64000
unkown
page read and write
2B0D000
trusted library allocation
page read and write
2EC2E48B000
trusted library allocation
page read and write
2B95000
trusted library allocation
page read and write
7FF5ED445000
unkown
page readonly
2AF2000
trusted library allocation
page read and write
2A6E000
trusted library allocation
page read and write
C00015C000
direct allocation
page read and write
B629000
stack
page read and write
4F4F000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
4F64000
trusted library allocation
page read and write
3030000
unkown
page read and write
2F9F000
heap
page read and write
40B000
unkown
page execute read
420000
heap
page read and write
3150000
unkown
page read and write
AB49000
unkown
page read and write
314F000
trusted library allocation
page read and write
3155000
trusted library allocation
page read and write
3460000
unkown
page read and write
4F3F000
stack
page read and write
7FF65B6B0000
unkown
page readonly
2710000
heap
page read and write
3030000
unkown
page read and write
3040000
unkown
page read and write
3010000
unkown
page read and write
3420000
unkown
page read and write
2BB2000
trusted library allocation
page read and write
CBBA000
unkown
page read and write
9A60000
unkown
page read and write
2AD5000
trusted library allocation
page read and write
91B9000
stack
page read and write
2A8B000
trusted library allocation
page read and write
3148000
trusted library allocation
page read and write
2EC2EF1E000
trusted library allocation
page read and write
2A1E000
trusted library allocation
page read and write
437000
heap
page read and write
4F94000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
C0000BE000
direct allocation
page read and write
1DCCE060000
heap
page read and write
2C1C000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
19D000
stack
page read and write
4C34000
unkown
page read and write
2EC2F767000
trusted library allocation
page read and write
7DF4F3061000
unkown
page execute read
3030000
unkown
page read and write
15BF3A10000
trusted library allocation
page read and write
4BE3000
unkown
page read and write
3010000
unkown
page read and write
B330000
unkown
page read and write
36F0000
unkown
page readonly
7FF5ED505000
unkown
page readonly
3170000
unkown
page read and write
15BD95C5000
heap
page read and write
B370000
unkown
page read and write
1A460B5A000
direct allocation
page read and write
2B2C000
trusted library allocation
page read and write
7FF65BB46000
unkown
page read and write
7FFD9BDD0000
trusted library allocation
page execute and read and write
9138000
stack
page read and write
7FF5ED3A7000
unkown
page readonly
A8B6D8D000
stack
page read and write
3364000
trusted library allocation
page read and write
4F61000
trusted library allocation
page read and write
2EC2F8C9000
trusted library allocation
page read and write
318F000
trusted library allocation
page read and write
C000086000
direct allocation
page read and write
7DF4F3050000
unkown
page readonly
369E000
stack
page read and write
7FF65C219000
unkown
page read and write
7FF5ED806000
unkown
page readonly
B330000
unkown
page read and write
FE74000
unkown
page read and write
7FF4094A0000
trusted library allocation
page execute and read and write
7FF5ED97A000
unkown
page readonly
C6F8000
unkown
page read and write
3030000
unkown
page read and write
2FA0000
heap
page read and write
B370000
unkown
page read and write
22966310000
heap
page read and write
787C000
unkown
page read and write
2554000
heap
page read and write
6020000
trusted library allocation
page read and write
B10D000
stack
page read and write
1370000
unkown
page read and write
3123000
trusted library allocation
page read and write
1370000
unkown
page read and write
1370000
unkown
page read and write
2A4E000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FF65B6B1000
unkown
page execute read
2B84000
trusted library allocation
page read and write
C000296000
direct allocation
page read and write
2BEA000
trusted library allocation
page read and write
9B00000
unkown
page read and write
9A60000
unkown
page read and write
B330000
unkown
page read and write
7FF5EDA47000
unkown
page readonly
311E000
trusted library allocation
page read and write
C0000A4000
direct allocation
page read and write
2A6C000
trusted library allocation
page read and write
2B7C000
trusted library allocation
page read and write
3420000
unkown
page read and write
4E8B000
trusted library allocation
page read and write
7FF65BBD0000
unkown
page write copy
2CC8000
trusted library allocation
page read and write
8FB9000
stack
page read and write
1DCE986B000
heap
page read and write
2B4A000
trusted library allocation
page read and write
3030000
unkown
page read and write
1E64A6D0000
heap
page read and write
986B000
unkown
page read and write
7FFD9B862000
trusted library allocation
page read and write
2C08000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
3420000
unkown
page read and write
7DC0000
unkown
page read and write
180000
trusted library allocation
page read and write
1370000
unkown
page read and write
7DD0000
unkown
page read and write
3150000
unkown
page read and write
7FF5ECED2000
unkown
page readonly
3628000
trusted library allocation
page read and write
B370000
unkown
page read and write
2530000
heap
page read and write
615000
heap
page read and write
3155000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3010000
unkown
page read and write
2EC46812000
heap
page read and write
1A460B10000
direct allocation
page read and write
3401000
unkown
page read and write
7DC0000
unkown
page read and write
2EC46136000
heap
page execute and read and write
9AA0000
unkown
page read and write
5FF0000
trusted library allocation
page read and write
7FF764860000
unkown
page readonly
2721000
unclassified section
page execute read
3030000
unkown
page read and write
C00004B000
direct allocation
page read and write
3030000
unkown
page read and write
2FB8000
heap
page read and write
1370000
unkown
page read and write
316C000
trusted library allocation
page read and write
6CA60000
unkown
page readonly
8720000
unkown
page readonly
2F70000
heap
page read and write
2A14000
trusted library allocation
page read and write
48FD000
stack
page read and write
2640000
trusted library allocation
page read and write
3420000
unkown
page read and write
9B00000
stack
page read and write
5F9000
heap
page read and write
7FF5ED519000
unkown
page readonly
335A000
trusted library allocation
page read and write
54C0000
heap
page read and write
3ABB3FD000
stack
page read and write
4F63000
trusted library allocation
page read and write
2C5F000
trusted library allocation
page read and write
300D000
heap
page read and write
336A000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
4F5C000
trusted library allocation
page read and write
1370000
unkown
page read and write
C0001C4000
direct allocation
page read and write
56C3000
unkown
page read and write
3420000
unkown
page read and write
C0000D0000
direct allocation
page read and write
5CD0000
remote allocation
page read and write
4E9E000
trusted library allocation
page read and write
7E70000
unkown
page read and write
A3BE000
unkown
page read and write
7FF5ED94A000
unkown
page readonly
1370000
unkown
page read and write
1370000
unkown
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FF5EDA2A000
unkown
page readonly
1370000
unkown
page read and write
3030000
unkown
page read and write
7FFD9BD40000
trusted library allocation
page read and write
6CA3C000
unkown
page write copy
3359000
trusted library allocation
page read and write
15BD9614000
heap
page read and write
26F0000
trusted library allocation
page read and write
6CB000
stack
page read and write
F56CDBE000
stack
page read and write
B330000
unkown
page read and write
7FF5ED2A9000
unkown
page readonly
1370000
unkown
page read and write
5CF0000
trusted library allocation
page read and write
C41F000
stack
page read and write
1370000
unkown
page read and write
3420000
unkown
page read and write
7FF5ED3F3000
unkown
page readonly
7D90000
unkown
page read and write
15BDAF50000
heap
page read and write
20A58400000
heap
page read and write
7DF44CEF0000
trusted library allocation
page execute and read and write
3037000
heap
page read and write
431000
unkown
page read and write
2B66000
trusted library allocation
page read and write
7FF5ED814000
unkown
page readonly
7DF4F3051000
unkown
page execute read
7FFD9BB20000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
7FF5ED39E000
unkown
page readonly
585000
heap
page read and write
336A000
trusted library allocation
page read and write
54C1000
heap
page read and write
4250000
heap
page read and write
7D80000
unkown
page read and write
298E000
stack
page read and write
3030000
unkown
page read and write
7FD68F7000
stack
page read and write
C0003BC000
direct allocation
page read and write
3176000
trusted library allocation
page read and write
2A42000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page execute and read and write
C000096000
direct allocation
page read and write
4F52000
trusted library allocation
page read and write
25B0000
heap
page read and write
7D90000
unkown
page read and write
2D50000
remote allocation
page read and write
7FF65BB45000
unkown
page write copy
275A5170000
heap
page read and write
7FF5ED850000
unkown
page readonly
2CB3000
trusted library allocation
page read and write
7FF5ED9B8000
unkown
page readonly
2C18000
trusted library allocation
page read and write
333E000
stack
page read and write
2C6B000
trusted library allocation
page read and write
28F8300B000
heap
page read and write
3420000
unkown
page read and write
5A8E000
stack
page read and write
3352000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3168000
trusted library allocation
page read and write
4F49000
trusted library allocation
page read and write
9869000
unkown
page read and write
430000
heap
page read and write
7FF5ED7CF000
unkown
page readonly
1F4E000
stack
page read and write
336A000
trusted library allocation
page read and write
2CC6000
trusted library allocation
page read and write
7FFD9B936000
trusted library allocation
page read and write
2B0F000
trusted library allocation
page read and write
A8AFCAF000
stack
page read and write
1370000
unkown
page read and write
3116000
trusted library allocation
page read and write
7FFD9B8AD000
trusted library allocation
page execute and read and write
5290000
heap
page read and write
41F000
unkown
page readonly
C700000
unkown
page read and write
B370000
unkown
page read and write
401000
unkown
page execute read
3350000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
C000184000
direct allocation
page read and write
2A68000
trusted library allocation
page read and write
2C37000
trusted library allocation
page read and write
5D00000
heap
page read and write
2ADD000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF5ED55F000
unkown
page readonly
2EC2C370000
heap
page readonly
4CB0000
unkown
page read and write
2CAD000
trusted library allocation
page read and write
3170000
unkown
page read and write
7FF5ED933000
unkown
page readonly
4F58000
trusted library allocation
page read and write
3040000
unkown
page read and write
31B0000
trusted library allocation
page read and write
B330000
unkown
page read and write
8B60000
unkown
page readonly
3137000
trusted library allocation
page read and write
CB46000
unkown
page read and write
3048000
heap
page read and write
396A000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
2AC5000
trusted library allocation
page read and write
5FD000
heap
page read and write
786B000
unkown
page read and write
7C80000
unkown
page read and write
C000028000
direct allocation
page read and write
1DCCC6B0000
trusted library allocation
page read and write
3460000
unkown
page read and write
4FCF000
trusted library allocation
page read and write
F56CC3C000
stack
page read and write
7FF764952000
unkown
page write copy
6000000
trusted library allocation
page read and write
3010000
unkown
page read and write
303E000
heap
page read and write
3795000
unkown
page read and write
7FFD9BCC2000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
5D01000
heap
page read and write
3065000
heap
page read and write
4FA2000
trusted library allocation
page read and write
3030000
unkown
page read and write
7DB0000
unkown
page read and write
2EC2C380000
trusted library allocation
page read and write
3549000
trusted library allocation
page read and write
1DCCDFD0000
heap
page execute and read and write
334E000
trusted library allocation
page read and write
2CAF000
trusted library allocation
page read and write
2B3F000
stack
page read and write
1A460B41000
direct allocation
page read and write
266B000
trusted library allocation
page execute and read and write
315F000
trusted library allocation
page read and write
A32A000
unkown
page read and write
3128000
trusted library allocation
page read and write
3016000
heap
page read and write
C00010E000
direct allocation
page read and write
F56DCCE000
stack
page read and write
5E00000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF5ED433000
unkown
page readonly
7D80000
unkown
page read and write
3420000
unkown
page read and write
9A60000
unkown
page read and write
7FFD9BC10000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
7FFD9B893000
trusted library allocation
page read and write
2FB8000
heap
page read and write
507D000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
1DCCC260000
unkown
page readonly
4FDE000
trusted library allocation
page read and write
27C3000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
2C02000
trusted library allocation
page read and write
5FE0000
trusted library allocation
page read and write
3170000
unkown
page read and write
9AA0000
unkown
page read and write
C0000C4000
direct allocation
page read and write
A37B000
unkown
page read and write
1370000
unkown
page read and write
2BE9000
trusted library allocation
page read and write
5F9000
heap
page read and write
3037000
heap
page read and write
B8C0000
unkown
page readonly
3460000
unkown
page read and write
2A7F000
trusted library allocation
page read and write
797D000
unkown
page read and write
2EC2E501000
trusted library allocation
page read and write
3038000
heap
page read and write
2B2F000
trusted library allocation
page read and write
1370000
unkown
page read and write
7FF5ED9A1000
unkown
page readonly
4F83000
trusted library allocation
page read and write
303C000
heap
page read and write
3047000
heap
page read and write
2B15000
trusted library allocation
page read and write
B330000
unkown
page read and write
8860000
unkown
page read and write
3420000
unkown
page read and write
302B000
heap
page read and write
311E000
trusted library allocation
page read and write
3165000
trusted library allocation
page read and write
5CB4000
trusted library allocation
page read and write
1A41B790000
direct allocation
page read and write
14B000
trusted library allocation
page execute and read and write
2EC2F95F000
trusted library allocation
page read and write
3450000
unkown
page read and write
300D000
heap
page read and write
20A584E0000
heap
page read and write
275A5314000
heap
page read and write
C4A0000
unkown
page read and write
A8B2FFE000
stack
page read and write
A391000
unkown
page read and write
3044000
heap
page read and write
3166000
trusted library allocation
page read and write
2BF1000
trusted library allocation
page read and write
1ABF35D0000
heap
page read and write
1370000
unkown
page read and write
3020000
unkown
page read and write
7FF5ED77E000
unkown
page readonly
7FFD9BA80000
trusted library allocation
page execute and read and write
7FF65BBCD000
unkown
page read and write
5475000
trusted library allocation
page read and write
54C1000
heap
page read and write
2A8F000
trusted library allocation
page read and write
3420000
unkown
page read and write
15BF63DA000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
3030000
unkown
page read and write
3168000
trusted library allocation
page read and write
2EC2F962000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
9A60000
unkown
page read and write
97AD000
unkown
page read and write
229663BC000
heap
page read and write
3137000
trusted library allocation
page read and write
3050000
unkown
page read and write
3010000
unkown
page read and write
7FF5ED404000
unkown
page readonly
8EE000
stack
page read and write
1A41B7A8000
heap
page read and write
354F000
trusted library allocation
page read and write
7FF5EDA70000
unkown
page readonly
5FA000
heap
page read and write
9DED000
stack
page read and write
57C0000
trusted library allocation
page read and write
1DCCE4AF000
trusted library allocation
page read and write
275A54BE000
heap
page read and write
3030000
unkown
page read and write
C0000CC000
direct allocation
page read and write
7DC0000
unkown
page read and write
1DCCC540000
heap
page read and write
310B000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
3170000
unkown
page read and write
FE10000
unkown
page read and write
2B37000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7E70000
unkown
page read and write
1DCCC655000
heap
page read and write
3037000
heap
page read and write
7DB0000
unkown
page read and write
3030000
unkown
page read and write
4E86000
trusted library allocation
page read and write
3030000
unkown
page read and write
3020000
unkown
page read and write
C0000C8000
direct allocation
page read and write
9A60000
unkown
page read and write
15BD98D0000
heap
page read and write
3EA5000
trusted library allocation
page read and write
C557000
unkown
page read and write
3030000
unkown
page read and write
C000172000
direct allocation
page read and write
2EC2F935000
trusted library allocation
page read and write
7FF5EDA76000
unkown
page readonly
304F000
heap
page read and write
7D90000
unkown
page read and write
7FF5ED265000
unkown
page readonly
C000046000
direct allocation
page read and write
3758000
unkown
page read and write
3348000
trusted library allocation
page read and write
2ADB000
trusted library allocation
page read and write
C00003D000
direct allocation
page read and write
C000800000
direct allocation
page read and write
7FF5ED7D6000
unkown
page readonly
2C6D000
trusted library allocation
page read and write
3352000
trusted library allocation
page read and write
7D90000
unkown
page read and write
7FF5ED781000
unkown
page readonly
27CC000
trusted library allocation
page execute and read and write
2C6F000
trusted library allocation
page read and write
7FFD9B863000
trusted library allocation
page execute and read and write
315E000
trusted library allocation
page read and write
500000
heap
page read and write
37A8000
unkown
page read and write
A21E000
stack
page read and write
4FE1000
trusted library allocation
page read and write
7FF65BB50000
unkown
page read and write
5F9000
heap
page read and write
2B52000
trusted library allocation
page read and write
2C2F000
trusted library allocation
page read and write
7FF5ED7E9000
unkown
page readonly
2CB1000
trusted library allocation
page read and write
3011000
heap
page read and write
B330000
unkown
page read and write
7FF5ED9CC000
unkown
page readonly
2750000
heap
page read and write
C000332000
direct allocation
page read and write
6000000
trusted library allocation
page read and write
7FF7648ED000
unkown
page readonly
C0001CA000
direct allocation
page read and write
2C71000
trusted library allocation
page read and write
3580000
trusted library allocation
page read and write
9A60000
unkown
page read and write
4E80000
trusted library allocation
page read and write
3030000
unkown
page read and write
F56C7FE000
stack
page read and write
E59D000
stack
page read and write
7E70000
unkown
page read and write
20A56900000
heap
page read and write
3010000
unkown
page read and write
3379000
trusted library allocation
page read and write
3032000
heap
page read and write
334A000
trusted library allocation
page read and write
7FF5ED644000
unkown
page readonly
2AC6000
trusted library allocation
page read and write
7D80000
unkown
page read and write
298F000
stack
page read and write
F56DACC000
stack
page read and write
4F9B000
trusted library allocation
page read and write
3341000
trusted library allocation
page read and write
7861000
unkown
page read and write
7FF5ED4C2000
unkown
page readonly
3420000
unkown
page read and write
4F7B000
trusted library allocation
page read and write
A8B47FE000
stack
page read and write
4F48000
trusted library allocation
page read and write
B981FF000
stack
page read and write
4F4B000
trusted library allocation
page read and write
2B97000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1DCCC520000
heap
page read and write
2BD9000
trusted library allocation
page read and write
98A8000
unkown
page read and write
7FD69FE000
stack
page read and write
6CA4E000
unkown
page read and write
2EC2C234000
heap
page read and write
7FFD9BA42000
trusted library allocation
page read and write
7FF5EDA38000
unkown
page readonly
3990000
heap
page read and write
7FFD9BD50000
trusted library allocation
page read and write
3170000
unkown
page read and write
36D3000
stack
page read and write
23DC000
stack
page read and write
6010000
direct allocation
page execute and read and write
300D000
heap
page read and write
3042000
heap
page read and write
3420000
unkown
page read and write
3030000
unkown
page read and write
3129000
trusted library allocation
page read and write
7FF5ED872000
unkown
page readonly
3100000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
55C0000
heap
page read and write
2C09000
trusted library allocation
page read and write
3020000
heap
page read and write
336A000
trusted library allocation
page read and write
3010000
unkown
page read and write
2C42000
trusted library allocation
page read and write
2EC3E0F1000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
29FF000
trusted library allocation
page read and write
B330000
unkown
page read and write
4E60000
trusted library allocation
page read and write
1DCE9868000
heap
page read and write
2EC2F947000
trusted library allocation
page read and write
3025000
heap
page read and write
2D50000
remote allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
9687000
unkown
page read and write
C000272000
direct allocation
page read and write
7FFD9BA69000
trusted library allocation
page read and write
7FFD9BDF0000
trusted library allocation
page read and write
B370000
unkown
page read and write
1370000
unkown
page read and write
B330000
unkown
page read and write
2662000
trusted library allocation
page read and write
450000
heap
page read and write
3165000
trusted library allocation
page read and write
1387000
unkown
page read and write
4F9D000
trusted library allocation
page read and write
2A1C000
trusted library allocation
page read and write
2EC46410000
trusted library allocation
page read and write
2700000
remote allocation
page read and write
3420000
unkown
page read and write
2A56000
trusted library allocation
page read and write
2B99000
trusted library allocation
page read and write
2680000
heap
page read and write
7DC0000
unkown
page read and write
7DD0000
unkown
page read and write
3050000
unkown
page read and write
7FF5ED42B000
unkown
page readonly
2EC2C2F5000
heap
page read and write
3420000
unkown
page read and write
3860000
direct allocation
page execute and read and write
3420000
unkown
page read and write
C000057000
direct allocation
page read and write
2B69000
trusted library allocation
page read and write
311D000
trusted library allocation
page read and write
B330000
unkown
page read and write
9885000
unkown
page read and write
4F44000
trusted library allocation
page read and write
401000
unkown
page execute read
3040000
unkown
page read and write
B729000
stack
page read and write
3350000
trusted library allocation
page read and write
C0003AA000
direct allocation
page read and write
2AF0000
trusted library allocation
page read and write
2B2D000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
303E000
heap
page read and write
2EC2EBE8000
trusted library allocation
page read and write
B985FF000
stack
page read and write
3030000
unkown
page read and write
3170000
unkown
page read and write
CA63000
unkown
page read and write
B150000
unkown
page read and write
4F5B000
trusted library allocation
page read and write
A49E000
unkown
page read and write
19F000
stack
page read and write
3420000
unkown
page read and write
610000
heap
page read and write
7DF4F3071000
unkown
page execute read
C503000
unkown
page read and write
3030000
unkown
page read and write
7FF5ED5C5000
unkown
page readonly
43BC000
trusted library allocation
page read and write
303C000
heap
page read and write
313D000
trusted library allocation
page read and write
5ED000
heap
page read and write
217E000
stack
page read and write
7FFD9B91C000
trusted library allocation
page execute and read and write
3030000
unkown
page read and write
3030000
unkown
page read and write
2EC2C232000
heap
page read and write
4F41000
trusted library allocation
page read and write
7D80000
unkown
page read and write
257E000
heap
page read and write
9A60000
unkown
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FD62FA000
stack
page read and write
7FF65BB51000
unkown
page write copy
89E0000
unkown
page read and write
3030000
unkown
page read and write
A8B3BFB000
stack
page read and write
4F73000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FFD9B8DC000
trusted library allocation
page execute and read and write
5E0000
heap
page read and write
F0000
trusted library section
page read and write
304E000
heap
page read and write
2EC467B5000
heap
page read and write
2633000
trusted library allocation
page execute and read and write
2B19000
trusted library allocation
page read and write
B370000
unkown
page read and write
7FF5ED3D6000
unkown
page readonly
E99F000
stack
page read and write
7FF5ED660000
unkown
page readonly
300D000
heap
page read and write
4EF0000
trusted library allocation
page read and write
2FDA000
heap
page read and write
B330000
unkown
page read and write
28F84B40000
heap
page read and write
335A000
trusted library allocation
page read and write
3050000
unkown
page read and write
7D90000
unkown
page read and write
9A60000
unkown
page read and write
6CABE000
unkown
page read and write
7FF65C22A000
unkown
page write copy
1A460BB3000
direct allocation
page read and write
B330000
unkown
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
2C3B000
trusted library allocation
page read and write
7FF5ED59E000
unkown
page readonly
1370000
unkown
page read and write
7FF65C226000
unkown
page write copy
3050000
unkown
page read and write
3030000
unkown
page read and write
2790000
trusted library allocation
page read and write
5CD0000
remote allocation
page read and write
3026000
heap
page read and write
7FF5ED810000
unkown
page readonly
29FB000
trusted library allocation
page read and write
1370000
unkown
page read and write
7FF5ED50A000
unkown
page readonly
C0001A0000
direct allocation
page read and write
B08D000
stack
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
60B11CB000
stack
page read and write
3030000
unkown
page read and write
3134000
trusted library allocation
page read and write
8CEB000
stack
page read and write
8D6D000
stack
page read and write
3030000
unkown
page read and write
3020000
unkown
page read and write
3034000
heap
page read and write
40A0000
unclassified section
page read and write
3020000
unkown
page read and write
C84D000
unkown
page read and write
334F000
trusted library allocation
page read and write
2C44000
trusted library allocation
page read and write
2BBE000
trusted library allocation
page read and write
CA12000
unkown
page read and write
3420000
unkown
page read and write
C0001A8000
direct allocation
page read and write
37AE000
unkown
page read and write
3420000
unkown
page read and write
B170000
unkown
page readonly
1370000
unkown
page read and write
56A000
heap
page read and write
3460000
unkown
page read and write
3618000
trusted library allocation
page read and write
C000156000
direct allocation
page read and write
590F000
stack
page read and write
4C50000
unkown
page read and write
3345000
trusted library allocation
page read and write
2B2E000
trusted library allocation
page read and write
3FDE000
unclassified section
page readonly
3129000
trusted library allocation
page read and write
3030000
unkown
page read and write
2BE8000
trusted library allocation
page read and write
B330000
unkown
page read and write
B370000
unkown
page read and write
313C000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3420000
unkown
page read and write
7FF5ED4F3000
unkown
page readonly
6000000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
4FB4000
trusted library allocation
page read and write
7FE08000
trusted library allocation
page execute and read and write
2D75000
heap
page read and write
5B90000
trusted library allocation
page read and write
2BCD000
trusted library allocation
page read and write
7FF5ED4DF000
unkown
page readonly
313D000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
2BDB000
trusted library allocation
page read and write
3130000
trusted library allocation
page read and write
2FA0000
heap
page read and write
C00004D000
direct allocation
page read and write
3170000
unkown
page read and write
11B0000
unkown
page readonly
3112000
trusted library allocation
page read and write
B370000
unkown
page read and write
263D000
trusted library allocation
page execute and read and write
7FF5ED697000
unkown
page readonly
3040000
unkown
page read and write
2B80000
trusted library allocation
page read and write
7FF65BBCF000
unkown
page read and write
6130000
heap
page read and write
8DA0000
unkown
page read and write
278E000
stack
page read and write
7FFD9BC10000
trusted library allocation
page read and write
100000
direct allocation
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
3420000
unkown
page read and write
7FFD9BB30000
trusted library allocation
page read and write
316C000
trusted library allocation
page read and write
3420000
unkown
page read and write
2EC2E4BE000
trusted library allocation
page read and write
3040000
unkown
page read and write
1DCDE138000
trusted library allocation
page read and write
4F6B000
trusted library allocation
page read and write
BD98000
stack
page read and write
E61E000
stack
page read and write
B370000
unkown
page read and write
4F86000
trusted library allocation
page read and write
315D000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
4FB1000
trusted library allocation
page read and write
1DCCC310000
heap
page read and write
7FF65C18D000
unkown
page read and write
C000309000
direct allocation
page read and write
3042000
heap
page read and write
1DCE982D000
heap
page read and write
25A3000
heap
page read and write
7FFD9B882000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
3047000
heap
page read and write
2644000
trusted library allocation
page read and write
2FA4000
heap
page read and write
B330000
unkown
page read and write
FE00000
heap
page read and write
336A000
trusted library allocation
page read and write
3420000
unkown
page read and write
A8B1FFE000
stack
page read and write
C964000
unkown
page read and write
7FF764861000
unkown
page execute read
2FB8000
heap
page read and write
3146000
trusted library allocation
page read and write
7FF5ED9FF000
unkown
page readonly
F56D8BF000
stack
page read and write
7DC0000
unkown
page read and write
2EC46601000
heap
page read and write
7FF5ED76D000
unkown
page readonly
2B7A000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
229666B4000
heap
page read and write
4E84000
trusted library allocation
page read and write
3791000
unkown
page read and write
3037000
heap
page read and write
229663B5000
heap
page read and write
C0003DE000
direct allocation
page read and write
1DCE97C0000
heap
page read and write
2B39000
trusted library allocation
page read and write
142000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
3030000
unkown
page read and write
1370000
unkown
page read and write
3044000
heap
page read and write
3037000
heap
page read and write
2CDF000
trusted library allocation
page read and write
2EC2E0C0000
heap
page read and write
C811000
unkown
page read and write
3105000
trusted library allocation
page read and write
317F000
trusted library allocation
page read and write
3420000
unkown
page read and write
3359000
trusted library allocation
page read and write
3460000
unkown
page read and write
F56D9CE000
stack
page read and write
3148000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
2ADF000
trusted library allocation
page read and write
2EC46130000
heap
page execute and read and write
2B50000
trusted library allocation
page read and write
271E000
heap
page read and write
2448000
unkown
page readonly
15BF3A66000
heap
page read and write
37BD000
unkown
page read and write
7FF5EDA0D000
unkown
page readonly
7FF5ED418000
unkown
page readonly
7FF5ED755000
unkown
page readonly
622000
heap
page read and write
3148000
trusted library allocation
page read and write
1DCCE944000
trusted library allocation
page read and write
2BEB000
trusted library allocation
page read and write
3020000
stack
page read and write
A11F000
stack
page read and write
3ABAFFD000
stack
page read and write
3030000
unkown
page read and write
2A18000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
C000378000
direct allocation
page read and write
3040000
unkown
page read and write
3ABC3FE000
stack
page read and write
A494000
unkown
page read and write
2B4C000
trusted library allocation
page read and write
5FA000
heap
page read and write
9A60000
unkown
page read and write
7D90000
unkown
page read and write
3030000
unkown
page read and write
591000
heap
page read and write
5CF0000
trusted library allocation
page read and write
2EC2F8B5000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
4F7C000
trusted library allocation
page read and write
CA7C000
unkown
page read and write
2BB1000
trusted library allocation
page read and write
6CAC0000
unkown
page readonly
7FF65BBE8000
unkown
page write copy
25E0000
direct allocation
page read and write
EF5A2FB000
stack
page read and write
3040000
unkown
page read and write
7D90000
unkown
page read and write
6CA50000
unkown
page readonly
6CAC0000
unkown
page readonly
5528000
heap
page read and write
3420000
unkown
page read and write
229666B0000
heap
page read and write
5BA0000
trusted library allocation
page read and write
FE70000
unkown
page read and write
7DC0000
unkown
page read and write
400000
unkown
page readonly
B370000
unkown
page read and write
2FA4000
heap
page read and write
4F41000
trusted library allocation
page read and write
1A460C26000
direct allocation
page read and write
5F9000
heap
page read and write
5CF0000
trusted library allocation
page read and write
7FF5ED3EA000
unkown
page readonly
3030000
unkown
page read and write
1370000
unkown
page read and write
1DCCE409000
trusted library allocation
page read and write
7FF5ED9D6000
unkown
page readonly
3030000
unkown
page read and write
37F9000
unkown
page read and write
4E80000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
15BD96F0000
heap
page read and write
7D80000
unkown
page read and write
6030000
trusted library allocation
page read and write
3034000
heap
page read and write
4151000
heap
page read and write
965C000
stack
page read and write
7FF5ED9D9000
unkown
page readonly
2C04000
trusted library allocation
page read and write
4B93000
unkown
page read and write
7FF5ED8FF000
unkown
page readonly
7D80000
unkown
page read and write
2EC2EA65000
trusted library allocation
page read and write
7FDF0000
trusted library allocation
page execute and read and write
2EC2C3B0000
trusted library allocation
page read and write
3420000
unkown
page read and write
76A0000
unkown
page read and write
5FF0000
trusted library allocation
page read and write
2FB8000
heap
page read and write
7D20000
unkown
page readonly
5E0E000
stack
page read and write
3420000
unkown
page read and write
3021000
heap
page read and write
3050000
unkown
page read and write
7D80000
unkown
page read and write
423000
unkown
page write copy
C000132000
direct allocation
page read and write
3756000
unkown
page read and write
2EC3E3C5000
trusted library allocation
page read and write
2EC460F0000
heap
page execute and read and write
B370000
unkown
page read and write
7FFD9B864000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF764860000
unkown
page readonly
2EC46205000
heap
page read and write
A479000
unkown
page read and write
22966340000
heap
page read and write
5046000
trusted library allocation
page read and write
3240000
unkown
page read and write
C00016C000
direct allocation
page read and write
7FFD9B89D000
trusted library allocation
page execute and read and write
311E000
trusted library allocation
page read and write
50ED000
trusted library allocation
page read and write
1DCCC4F6000
heap
page read and write
610000
heap
page read and write
2EC2E0D1000
trusted library allocation
page read and write
334B000
trusted library allocation
page read and write
9893000
unkown
page read and write
4B8B000
unkown
page read and write
3020000
unkown
page read and write
7FFD9BBD3000
trusted library allocation
page read and write
1DCCC45F000
heap
page read and write
3030000
unkown
page read and write
7D53000
unkown
page read and write
B8AB000
stack
page read and write
3010000
stack
page read and write
3010000
unkown
page read and write
3420000
unkown
page read and write
3173000
trusted library allocation
page read and write
300D000
heap
page read and write
41F000
unkown
page readonly
C52C000
unkown
page read and write
3040000
unkown
page read and write
3748000
unkown
page read and write
AB5E000
unkown
page read and write
2B8F000
trusted library allocation
page read and write
301D000
heap
page read and write
3030000
unkown
page read and write
7DB0000
unkown
page read and write
B330000
unkown
page read and write
7CE0000
unkown
page read and write
7FFD9B860000
trusted library allocation
page read and write
54C1000
heap
page read and write
318F000
trusted library allocation
page read and write
3030000
unkown
page read and write
AAF6000
unkown
page read and write
1DCE6A70000
heap
page read and write
3540000
heap
page read and write
7DC0000
unkown
page read and write
2B30000
trusted library allocation
page read and write
3030000
unkown
page read and write
4BE1000
unkown
page read and write
B330000
unkown
page read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
2950000
heap
page execute and read and write
3150000
unkown
page read and write
B330000
unkown
page read and write
3377000
trusted library allocation
page read and write
7D90000
unkown
page read and write
1370000
unkown
page read and write
3010000
unkown
page read and write
7FFD9B93C000
trusted library allocation
page execute and read and write
5D1000
heap
page read and write
7FF5ED9A6000
unkown
page readonly
316E000
trusted library allocation
page read and write
4E1F000
stack
page read and write
380E000
stack
page read and write
3047000
heap
page read and write
5C9000
heap
page read and write
2C2D000
trusted library allocation
page read and write
785F000
unkown
page read and write
3420000
unkown
page read and write
3037000
heap
page read and write
2B82000
trusted library allocation
page read and write
2AC1000
trusted library allocation
page read and write
3FE1000
unclassified section
page write copy
335A000
trusted library allocation
page read and write
7FF5ED3DA000
unkown
page readonly
2C16000
trusted library allocation
page read and write
26E0000
direct allocation
page execute and read and write
9CFC000
stack
page read and write
3136000
trusted library allocation
page read and write
7FFD9B936000
trusted library allocation
page read and write
2534000
heap
page read and write
7FF65C227000
unkown
page write copy
2C26000
trusted library allocation
page read and write
6030000
trusted library allocation
page read and write
2AD7000
trusted library allocation
page read and write
3010000
unkown
page read and write
3030000
stack
page read and write
60000
direct allocation
page execute and read and write
20A584E8000
heap
page read and write
3A87000
trusted library allocation
page read and write
9AC0000
unkown
page read and write
C0002A5000
direct allocation
page read and write
3346000
trusted library allocation
page read and write
15BD9735000
heap
page read and write
9660000
unkown
page read and write
4E3C000
stack
page read and write
405000
unkown
page readonly
7FF5ED986000
unkown
page readonly
2ADB000
trusted library allocation
page read and write
20A582F0000
heap
page read and write
7FF5ED495000
unkown
page readonly
9C000
stack
page read and write
B22B000
stack
page read and write
7D90000
unkown
page read and write
2C10000
trusted library allocation
page read and write
3030000
unkown
page read and write
7D80000
unkown
page read and write
3047000
heap
page read and write
1A460C64000
direct allocation
page read and write
20A58300000
heap
page read and write
1370000
unkown
page read and write
40AF000
stack
page read and write
C000059000
direct allocation
page read and write
3B9F000
stack
page read and write
3170000
unkown
page read and write
2AE2000
trusted library allocation
page read and write
1DCE8118000
heap
page read and write
9AE0000
unkown
page read and write
3166000
trusted library allocation
page read and write
C0003D8000
direct allocation
page read and write
C50A000
unkown
page read and write
9E000
stack
page read and write
7FF5ED471000
unkown
page readonly
2C22000
trusted library allocation
page read and write
2A3E000
stack
page read and write
7FFD9B882000
trusted library allocation
page read and write
1370000
unkown
page read and write
3030000
unkown
page read and write
C000284000
direct allocation
page read and write
78A0000
unkown
page read and write
3030000
unkown
page read and write
488000
heap
page read and write
3420000
unkown
page read and write
402000
unkown
page readonly
402000
unkown
page readonly
3032000
heap
page read and write
C0000BC000
direct allocation
page read and write
88EE000
stack
page read and write
20A56919000
heap
page read and write
2C25000
trusted library allocation
page read and write
4F67000
trusted library allocation
page read and write
F56DA4F000
stack
page read and write
7FF5ED6A5000
unkown
page readonly
7D80000
unkown
page read and write
2EC2C275000
heap
page read and write
3568000
trusted library allocation
page read and write
1095000
stack
page read and write
3030000
unkown
page read and write
9792000
unkown
page read and write
318C000
trusted library allocation
page read and write
2C22000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
7FF5ED71B000
unkown
page readonly
2BCF000
trusted library allocation
page read and write
3030000
unkown
page read and write
9A60000
unkown
page read and write
C000084000
direct allocation
page read and write
7867000
unkown
page read and write
2A10000
heap
page execute and read and write
1DCE7A80000
trusted library allocation
page read and write
4B50000
unkown
page read and write
5CE0000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
7FF5ED68C000
unkown
page readonly
3016000
heap
page read and write
4F99000
trusted library allocation
page read and write
5CE7000
trusted library allocation
page read and write
2D3D000
stack
page read and write
3030000
unkown
page read and write
3030000
unkown
page read and write
384E000
stack
page read and write
27B0000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
C0000A0000
direct allocation
page read and write
7FF65BBD2000
unkown
page read and write
7FF5ED9CA000
unkown
page readonly
7FF7648ED000
unkown
page readonly
113000
trusted library allocation
page execute and read and write
2EC2F71C000
trusted library allocation
page read and write
3030000
unkown
page read and write
3ABABFF000
stack
page read and write
7FF5ED74A000
unkown
page readonly
1DCCC580000
trusted library allocation
page read and write
6CA61000
unkown
page execute read
170000
trusted library allocation
page execute and read and write
3137000
trusted library allocation
page read and write
3137000
trusted library allocation
page read and write
2EC2C277000
heap
page read and write
20A58230000
heap
page read and write
2B88000
trusted library allocation
page read and write
B330000
unkown
page read and write
1DCE8170000
heap
page read and write
57C0000
trusted library allocation
page read and write
9A60000
unkown
page read and write
3420000
unkown
page read and write
3030000
unkown
page read and write
1DCE8198000
heap
page read and write
336A000
trusted library allocation
page read and write
560000
heap
page read and write
3137000
trusted library allocation
page read and write
87C0000
unkown
page read and write
4F62000
trusted library allocation
page read and write
A8B2BFE000
stack
page read and write
C000100000
direct allocation
page read and write
7FF5ED942000
unkown
page readonly
B330000
unkown
page read and write
C0000D4000
direct allocation
page read and write
7FF764860000
unkown
page readonly
4F93000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
B330000
unkown
page read and write
7BF000
stack
page read and write
2B05000
trusted library allocation
page read and write
3037000
heap
page read and write
7FD6BFF000
stack
page read and write
2EC2F8BD000
trusted library allocation
page read and write
4FA2000
trusted library allocation
page read and write
3163000
trusted library allocation
page read and write
3047000
heap
page read and write
5480000
trusted library allocation
page read and write
3CE24FF000
stack
page read and write
3122000
trusted library allocation
page read and write
36D5000
stack
page read and write
54A0000
trusted library allocation
page read and write
C000094000
direct allocation
page read and write
B370000
unkown
page read and write
3420000
unkown
page read and write
3030000
unkown
page read and write
3460000
unkown
page read and write
4F5F000
trusted library allocation
page read and write
28FE000
stack
page read and write
2AF4000
trusted library allocation
page read and write
5444000
trusted library allocation
page read and write
2EC2F533000
trusted library allocation
page read and write
4BDC000
unkown
page read and write
4130000
heap
page read and write
3129000
trusted library allocation
page read and write
275A52B0000
heap
page read and write
2EC2C360000
trusted library allocation
page read and write
75F000
stack
page read and write
2C8E000
trusted library allocation
page read and write
2A4C000
trusted library allocation
page read and write
313F000
trusted library allocation
page read and write
3420000
unkown
page read and write
C00005B000
direct allocation
page read and write
8108000
stack
page read and write
3030000
unkown
page read and write
3020000
heap
page read and write
3030000
unkown
page read and write
B330000
unkown
page read and write
2EC2E499000
trusted library allocation
page read and write
7FF5ED980000
unkown
page readonly
257A000
heap
page read and write
2A81000
trusted library allocation
page read and write
7FF65BB4E000
unkown
page write copy
2AC0000
trusted library allocation
page read and write
15BD9520000
heap
page read and write
4E90000
trusted library allocation
page read and write
7FF5ED5EB000
unkown
page readonly
B330000
unkown
page read and write
3ABA3FF000
stack
page read and write
3420000
unkown
page read and write
7FF5ED8C1000
unkown
page readonly
2EC2E090000
heap
page execute and read and write
314E000
trusted library allocation
page read and write
316E000
trusted library allocation
page read and write
37F6000
unkown
page read and write
785B000
unkown
page read and write
3038000
heap
page read and write
147000
trusted library allocation
page execute and read and write
20A568FD000
heap
page read and write
7FF5ED46E000
unkown
page readonly
B330000
unkown
page read and write
C0000AC000
direct allocation
page read and write
3122000
trusted library allocation
page read and write
3146000
trusted library allocation
page read and write
28F83055000
heap
page read and write
20A56926000
heap
page read and write
B330000
unkown
page read and write
2EC2F953000
trusted library allocation
page read and write
4F7000
heap
page read and write
3420000
unkown
page read and write
2EC3E101000
trusted library allocation
page read and write
978E000
unkown
page read and write
2C86000
trusted library allocation
page read and write
2B3F000
trusted library allocation
page read and write
C00003F000
direct allocation
page read and write
5BCC000
stack
page read and write
2A16000
trusted library allocation
page read and write
7FF764860000
unkown
page readonly
2C98000
trusted library allocation
page read and write
1DCCE49F000
trusted library allocation
page read and write
C08A000
stack
page read and write
4130000
heap
page read and write
B370000
unkown
page read and write
2EC2F94D000
trusted library allocation
page read and write
7D0000
heap
page read and write
4C4B000
unkown
page read and write
7D90000
unkown
page read and write
3369000
trusted library allocation
page read and write
3030000
unkown
page read and write
9883000
unkown
page read and write
4FB4000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
7D80000
unkown
page read and write
C0000
direct allocation
page read and write
FC63000
unkown
page read and write
3ABBFFE000
stack
page read and write
7FF5ED1D0000
unkown
page readonly
3170000
unkown
page read and write
1DCE80E2000
heap
page read and write
621000
heap
page read and write
3030000
unkown
page read and write
2710000
heap
page read and write
4BA6000
unkown
page read and write
2B11000
trusted library allocation
page read and write
51B5000
trusted library allocation
page read and write
7FF5ED279000
unkown
page readonly
303E000
heap
page read and write
2B41000
trusted library allocation
page read and write
4F6C000
trusted library allocation
page read and write
C5AA000
unkown
page read and write
1A460BA1000
direct allocation
page read and write
2A06000
trusted library allocation
page read and write
B00B000
stack
page read and write
C89A000
unkown
page read and write
610000
heap
page read and write
7FF5ED2A4000
unkown
page readonly
11D000
trusted library allocation
page execute and read and write
303C000
heap
page read and write
3047000
heap
page read and write
C6E3000
unkown
page read and write
272D000
heap
page execute and read and write
A8B1BFD000
stack
page read and write
2B20000
trusted library allocation
page read and write
2B46000
trusted library allocation
page read and write
7FF5ED818000
unkown
page readonly
9B5B000
stack
page read and write
3030000
unkown
page read and write
3290000
unkown
page read and write
2EC46802000
heap
page read and write
3040000
unkown
page read and write
C0001DA000
direct allocation
page read and write
3037000
heap
page read and write
4FA3000
trusted library allocation
page read and write
977A000
unkown
page read and write
1E64A6FA000
heap
page read and write
7D40000
unkown
page read and write
5CE5000
trusted library allocation
page read and write
7FF5ED4B4000
unkown
page readonly
2EC461DA000
heap
page read and write
336A000
trusted library allocation
page read and write
3420000
unkown
page read and write
5CE0000
trusted library allocation
page read and write
FC000
stack
page read and write
7FF5ED714000
unkown
page readonly
304E000
heap
page read and write
3020000
unkown
page read and write
7FD64FF000
stack
page read and write
3170000
unkown
page read and write
6CAAB000
unkown
page read and write
2BA9000
trusted library allocation
page read and write
1A460D90000
direct allocation
page read and write
9A60000
unkown
page read and write
3030000
unkown
page read and write
1DCE693E000
heap
page read and write
4F44000
trusted library allocation
page read and write
2B91000
trusted library allocation
page read and write
C0005DC000
direct allocation
page read and write
1370000
unkown
page read and write
7FF5ED800000
unkown
page readonly
3359000
trusted library allocation
page read and write
A33E000
unkown
page read and write
4E70000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
7FF5ED7C4000
unkown
page readonly
9A60000
unkown
page read and write
7D80000
unkown
page read and write
7DB0000
unkown
page read and write
C857000
unkown
page read and write
7E60000
unkown
page read and write
2A39000
trusted library allocation
page read and write
4BD000
heap
page read and write
2560000
direct allocation
page execute and read and write
3047000
heap
page read and write
2EC2C1B0000
heap
page read and write
3030000
unkown
page read and write
3420000
unkown
page read and write
54B0000
trusted library allocation
page read and write
2EC2F965000
trusted library allocation
page read and write
7FF5ED4A1000
unkown
page readonly
34E6000
stack
page read and write
B370000
unkown
page read and write
1A41B7A0000
heap
page read and write
7FF5ED7E0000
unkown
page readonly
336A000
trusted library allocation
page read and write
3030000
unkown
page read and write
C00005D000
direct allocation
page read and write
9AA0000
unkown
page read and write
2AF8000
trusted library allocation
page read and write
5B8F000
stack
page read and write
5CD0000
remote allocation
page read and write
A8B03F5000
stack
page read and write
C000052000
direct allocation
page read and write
611000
heap
page read and write
316E000
trusted library allocation
page read and write
3030000
unkown
page read and write
2BF3000
trusted library allocation
page read and write
35D0000
unkown
page read and write
4FCD000
trusted library allocation
page read and write
B330000
unkown
page read and write
7869000
unkown
page read and write
2C52000
trusted library allocation
page read and write
3030000
unkown
page read and write
2BAA000
trusted library allocation
page read and write
5DC000
heap
page read and write
336A000
trusted library allocation
page read and write
3D341FD000
stack
page read and write
9A60000
unkown
page read and write
1DCCC428000
heap
page read and write
3030000
unkown
page read and write
4EAD000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
2634000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
4F00000
heap
page execute and read and write
15BF3A40000
heap
page read and write
2B82000
trusted library allocation
page read and write
FE4D000
unkown
page read and write
7FF5ED52F000
unkown
page readonly
6000000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page read and write
FCAB000
unkown
page read and write
3030000
unkown
page read and write
5F3000
heap
page read and write
37D7000
trusted library allocation
page read and write
3965000
trusted library allocation
page read and write
BDC0000
unkown
page readonly
20A568A0000
heap
page read and write
2860000
heap
page read and write
7FF5ED1CC000
unkown
page readonly
7FFD9B880000
trusted library allocation
page read and write
7FFD9BA1A000
trusted library allocation
page read and write
594E000
stack
page read and write
7FD63FF000
stack
page read and write
7FF5ED849000
unkown
page readonly
5115000
trusted library allocation
page read and write
410000
heap
page read and write
4ED0000
trusted library allocation
page read and write
7DB0000
unkown
page read and write
3420000
unkown
page read and write
7DD0000
unkown
page read and write
2EC2C1F0000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
2C58000
trusted library allocation
page read and write
7FF5EDA69000
unkown
page readonly
2530000
heap
page read and write
3460000
unkown
page read and write
1DCCE2D7000
trusted library allocation
page read and write
7FF5ED864000
unkown
page readonly
300C000
heap
page read and write
1F0000
heap
page read and write
7FFD9B884000
trusted library allocation
page read and write
57C0000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
37B0000
unkown
page read and write
3047000
heap
page read and write
7FF5ED337000
unkown
page readonly
B330000
unkown
page read and write
1370000
unkown
page read and write
B330000
unkown
page read and write
7FFD9BBF4000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
3420000
unkown
page read and write
3420000
unkown
page read and write
3050000
unkown
page read and write
2C69000
trusted library allocation
page read and write
3030000
unkown
page read and write
C6F2000
unkown
page read and write
9AA0000
unkown
page read and write
F56D90E000
stack
page read and write
2BEF000
trusted library allocation
page read and write
2C7F000
stack
page read and write
2AF8000
trusted library allocation
page read and write
3620000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
3134000
trusted library allocation
page read and write
7D80000
unkown
page read and write
4E60000
trusted library allocation
page execute and read and write
2FB8000
heap
page read and write
7FFD9B8A4000
trusted library allocation
page read and write
315E000
trusted library allocation
page read and write
334A000
trusted library allocation
page read and write
7FF5ED586000
unkown
page readonly
2FB8000
heap
page read and write
1200000
unkown
page readonly
1DCE8130000
heap
page read and write
3047000
heap
page read and write
1DCE7E80000
heap
page read and write
3047000
heap
page read and write
3030000
unkown
page read and write
20A568E5000
heap
page read and write
15BEB111000
trusted library allocation
page read and write
401000
unkown
page execute read
20A5691F000
heap
page read and write
1DCCE851000
trusted library allocation
page read and write
B98DFE000
stack
page read and write
3170000
trusted library allocation
page read and write
C000098000
direct allocation
page read and write
4F49000
trusted library allocation
page read and write
2B5B000
trusted library allocation
page read and write
615000
heap
page read and write
C0003B6000
direct allocation
page read and write
F56CAF9000
stack
page read and write
4FA2000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
5511000
heap
page read and write
455000
heap
page read and write
C000041000
direct allocation
page read and write
3460000
unkown
page read and write
7FF5ED1D9000
unkown
page readonly
2C20000
trusted library allocation
page read and write
9A60000
unkown
page read and write
2CB6000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
2C33000
trusted library allocation
page read and write
7FF5ED7FD000
unkown
page readonly
3359000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2B9C000
trusted library allocation
page read and write
8000000
unkown
page read and write
5E0000
heap
page read and write
5E5000
heap
page read and write
2BAE000
trusted library allocation
page read and write
49FE000
stack
page read and write
3134000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page execute and read and write
2EC464C4000
heap
page read and write
C000158000
direct allocation
page read and write
3040000
unkown
page read and write
3030000
unkown
page read and write
313C000
trusted library allocation
page read and write
3030000
unkown
page read and write
C0002D2000
direct allocation
page read and write
7FF5ED867000
unkown
page readonly
20A568FB000
heap
page read and write
7FF65BB4C000
unkown
page read and write
2EC3E3B6000
trusted library allocation
page read and write
401000
unkown
page execute read
2BB7000
trusted library allocation
page read and write
7FF65C256000
unkown
page readonly
3030000
unkown
page read and write
313D000
trusted library allocation
page read and write
3D9F000
stack
page read and write
7FF5EDA08000
unkown
page readonly
336A000
trusted library allocation
page read and write
20A5690E000
heap
page read and write
2C94000
trusted library allocation
page read and write
2700000
remote allocation
page read and write
7FF65C226000
unkown
page read and write
3030000
unkown
page read and write
7FF5ED956000
unkown
page readonly
2A00000
trusted library allocation
page execute and read and write
C000160000
direct allocation
page read and write
2AFC000
trusted library allocation
page read and write
B370000
unkown
page read and write
3430000
unkown
page read and write
2D50000
remote allocation
page read and write
54C1000
heap
page read and write
7FF5ED81B000
unkown
page readonly
405000
unkown
page readonly
3030000
unkown
page read and write
B140000
unkown
page readonly
3190000
trusted library allocation
page read and write
2C73000
trusted library allocation
page read and write
C0001BD000
direct allocation
page read and write
5CF4000
trusted library allocation
page read and write
7FF5ED9F2000
unkown
page readonly
7FF5ED33F000
unkown
page readonly
1370000
unkown
page read and write
5636000
heap
page read and write
2B80000
trusted library allocation
page read and write
1A460BD2000
direct allocation
page read and write
270E000
stack
page read and write
2540000
heap
page read and write
2EC464A0000
heap
page read and write
7F2E000
stack
page read and write
3129000
trusted library allocation
page read and write
C0002C0000
direct allocation
page read and write
2B6B000
trusted library allocation
page read and write
1DCE8145000
heap
page read and write
BA000
stack
page read and write
3430000
unkown
page read and write
2B33000
trusted library allocation
page read and write
3020000
unkown
page read and write
2BD2000
trusted library allocation
page read and write
7D90000
unkown
page read and write
2F84000
heap
page read and write
7FFD9BD60000
trusted library allocation
page read and write
2CA9000
trusted library allocation
page read and write
C0003D6000
direct allocation
page read and write
7FFD9BD90000
trusted library allocation
page read and write
2B11000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
2AF0000
trusted library allocation
page read and write
2EC2C0B0000
heap
page read and write
27A0000
heap
page read and write
7DB0000
unkown
page read and write
1DCE80D0000
heap
page read and write
3034000
heap
page read and write
3010000
unkown
page read and write
7FF5ED93E000
unkown
page readonly
300E000
heap
page read and write
3420000
unkown
page read and write
3030000
unkown
page read and write
2EC2C27A000
heap
page read and write
8730000
unkown
page read and write
B370000
unkown
page read and write
401000
unkown
page execute read
3030000
heap
page read and write
335A000
trusted library allocation
page read and write
2FB8000
heap
page read and write
C00003B000
direct allocation
page read and write
C0000A8000
direct allocation
page read and write
335A000
trusted library allocation
page read and write
7FF764861000
unkown
page execute read
2BF6000
trusted library allocation
page read and write
3420000
unkown
page read and write
B330000
unkown
page read and write
B330000
unkown
page read and write
3460000
unkown
page read and write
C51E000
unkown
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3800000
unkown
page readonly
4F44000
trusted library allocation
page read and write
7D80000
unkown
page read and write
3900000
direct allocation
page read and write
4FA5000
trusted library allocation
page read and write
3460000
unkown
page read and write
5E3E000
stack
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FF5ED915000
unkown
page readonly
3040000
unkown
page read and write
420000
heap
page read and write
2BB0000
trusted library allocation
page read and write
335A000
trusted library allocation
page read and write
3AB9FF5000
stack
page read and write
7FF5ED695000
unkown
page readonly
C846000
unkown
page read and write
89A0000
unkown
page read and write
28F831D0000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1DCCC262000
unkown
page readonly
15BD9588000
heap
page read and write
20A56925000
heap
page read and write
1A460B51000
direct allocation
page read and write
1DCCE071000
trusted library allocation
page read and write
5DA000
heap
page read and write
7FF5ED65C000
unkown
page readonly
3420000
unkown
page read and write
7FF5ED847000
unkown
page readonly
3113000
trusted library allocation
page read and write
3010000
unkown
page read and write
7FF65B6B0000
unkown
page readonly
7CD0000
unkown
page read and write
313D000
trusted library allocation
page read and write
37DC000
trusted library allocation
page read and write
2A6A000
trusted library allocation
page read and write
2A27000
trusted library allocation
page read and write
7FF5ED409000
unkown
page readonly
3460000
unkown
page read and write
7DD0000
unkown
page read and write
8210000
unkown
page read and write
4E80000
trusted library allocation
page read and write
2EC2F959000
trusted library allocation
page read and write
2EC46770000
heap
page read and write
402000
unkown
page readonly
2C06000
trusted library allocation
page read and write
3CE22FB000
stack
page read and write
7FF5ED8E2000
unkown
page readonly
9AA0000
unkown
page read and write
2C3D000
trusted library allocation
page read and write
1370000
unkown
page read and write
6020000
trusted library allocation
page read and write
3010000
unkown
page read and write
20A568AC000
heap
page read and write
3141000
unkown
page read and write
54C0000
heap
page read and write
B330000
unkown
page read and write
4120000
heap
page read and write
3030000
unkown
page read and write
B330000
unkown
page read and write
7FF764952000
unkown
page write copy
B330000
unkown
page read and write
3A21000
trusted library allocation
page read and write
C544000
unkown
page read and write
1370000
unkown
page read and write
2EC2C190000
heap
page read and write
51EE000
trusted library allocation
page read and write
20A5690B000
heap
page read and write
2AD1000
trusted library allocation
page read and write
15BDAF00000
trusted library allocation
page read and write
784A000
unkown
page read and write
1DCCC640000
trusted library section
page readonly
7DB0000
unkown
page read and write
606D000
stack
page read and write
3460000
unkown
page read and write
1DCCE483000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
A8B37FE000
stack
page read and write
4C18000
unkown
page read and write
2AD7000
trusted library allocation
page read and write
275A52DF000
heap
page read and write
4F5F000
trusted library allocation
page read and write
3340000
trusted library allocation
page read and write
1DCCC633000
heap
page execute and read and write
4E90000
trusted library allocation
page read and write
3047000
heap
page read and write
7D90000
unkown
page read and write
3359000
trusted library allocation
page read and write
5CD6000
trusted library allocation
page read and write
2448000
unkown
page readonly
15BD9500000
heap
page read and write
3359000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
26DE000
stack
page read and write
275A53D0000
heap
page read and write
477F000
stack
page read and write
20A5691B000
heap
page read and write
53E000
heap
page read and write
3420000
unkown
page read and write
335A000
trusted library allocation
page read and write
A502000
unkown
page read and write
4F61000
trusted library allocation
page read and write
3030000
unkown
page read and write
B330000
unkown
page read and write
DE0000
unkown
page readonly
7FFD9BDB0000
trusted library allocation
page read and write
7D80000
unkown
page read and write
7900000
unkown
page read and write
A8B618E000
stack
page read and write
2AC2000
trusted library allocation
page read and write
7FFD9BC54000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
97D4000
unkown
page read and write
B330000
unkown
page read and write
3797000
unkown
page read and write
2B9E000
trusted library allocation
page read and write
7FF5ED476000
unkown
page readonly
CA20000
unkown
page read and write
7FF65BB44000
unkown
page read and write
7FFD9BCC4000
trusted library allocation
page read and write
B330000
unkown
page read and write
4F9C000
trusted library allocation
page read and write
7FF5ED793000
unkown
page readonly
F56CA7E000
stack
page read and write
A8B17FA000
stack
page read and write
610000
heap
page read and write
2ADF000
trusted library allocation
page read and write
7FF5ED7DB000
unkown
page readonly
3CE23FF000
unkown
page read and write
3166000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FF5ED93B000
unkown
page readonly
4F56000
trusted library allocation
page read and write
5F9000
heap
page read and write
7FF5ED210000
unkown
page readonly
979C000
unkown
page read and write
313F000
trusted library allocation
page read and write
C000118000
direct allocation
page read and write
818E000
stack
page read and write
2B2A000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
3020000
unkown
page read and write
7FF5ED735000
unkown
page readonly
3176000
trusted library allocation
page read and write
7695000
stack
page read and write
29FD000
stack
page read and write
310B000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
7CA0000
unkown
page read and write
5CCB000
stack
page read and write
316E000
trusted library allocation
page read and write
9A60000
unkown
page read and write
5CF0000
trusted library allocation
page read and write
314E000
trusted library allocation
page read and write
B640000
unkown
page read and write
C512000
unkown
page read and write
2C14000
trusted library allocation
page read and write
B370000
unkown
page read and write
3030000
heap
page read and write
2EC461F5000
heap
page read and write
2F9F000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
2A01000
trusted library allocation
page read and write
6000000
trusted library allocation
page read and write
2A63000
trusted library allocation
page read and write
9AE0000
unkown
page read and write
28FF000
stack
page read and write
7FF5ED46A000
unkown
page readonly
1DCE8470000
heap
page read and write
5E1000
heap
page read and write
3030000
unkown
page read and write
F56C77E000
stack
page read and write
6020000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
2A87000
trusted library allocation
page read and write
3030000
unkown
page read and write
3030000
unkown
page read and write
7FF5ED20D000
unkown
page readonly
9879000
unkown
page read and write
87C0000
unkown
page read and write
6CAAC000
unkown
page write copy
7FF5ED5F7000
unkown
page readonly
7FF5ED64F000
unkown
page readonly
3030000
unkown
page read and write
7FF5ED85F000
unkown
page readonly
2EC2E4FD000
trusted library allocation
page read and write
4FB0000
trusted library allocation
page read and write
3420000
unkown
page read and write
405000
unkown
page readonly
3036000
heap
page read and write
15BD9730000
heap
page read and write
402000
unkown
page readonly
3125000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
7FF5ED928000
unkown
page readonly
2743000
heap
page read and write
4F81000
trusted library allocation
page read and write
B190000
unkown
page read and write
37A0000
unkown
page read and write
2A7D000
trusted library allocation
page read and write
C0000C0000
direct allocation
page read and write
5BA0000
trusted library allocation
page read and write
2A52000
trusted library allocation
page read and write
1A41B8A0000
direct allocation
page read and write
3170000
unkown
page read and write
2B05000
trusted library allocation
page read and write
5C0000
direct allocation
page execute and read and write
7FF7648ED000
unkown
page readonly
401000
unkown
page execute read
2EC2C22D000
heap
page read and write
1210000
unkown
page readonly
4B1E000
stack
page read and write
7FF5ED534000
unkown
page readonly
2B5D000
trusted library allocation
page read and write
3030000
unkown
page read and write
5FF0000
trusted library allocation
page execute and read and write
7DD0000
unkown
page read and write
3170000
unkown
page read and write
7D80000
unkown
page read and write
7FFD9BD80000
trusted library allocation
page read and write
2EC2F871000
trusted library allocation
page read and write
C0001B6000
direct allocation
page read and write
B370000
unkown
page read and write
400000
unkown
page execute and read and write
5F7000
heap
page read and write
400000
unkown
page execute and read and write
2EC2F8BB000
trusted library allocation
page read and write
304F000
heap
page read and write
9A60000
unkown
page read and write
7FFD9BB60000
trusted library allocation
page read and write
CB39000
unkown
page read and write
C000031000
direct allocation
page read and write
9AE0000
unkown
page read and write
7FF5D1CCD000
unkown
page readonly
1DCCC630000
heap
page execute and read and write
C0000AE000
direct allocation
page read and write
1370000
unkown
page read and write
3460000
unkown
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFE000
stack
page read and write
2BB5000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7D90000
unkown
page read and write
405000
unkown
page readonly
7FF764952000
unkown
page read and write
2B93000
trusted library allocation
page read and write
3032000
heap
page read and write
5CF0000
trusted library allocation
page read and write
3020000
unkown
page read and write
3038000
heap
page read and write
FD22000
unkown
page read and write
C000140000
direct allocation
page read and write
C000000000
direct allocation
page read and write
1DCCC6F5000
heap
page read and write
3147000
trusted library allocation
page read and write
2F9F000
heap
page read and write
27C9000
trusted library allocation
page execute and read and write
7FFD9BA40000
trusted library allocation
page read and write
2FB8000
heap
page read and write
7D80000
unkown
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
2C0D000
trusted library allocation
page read and write
F56CD3E000
stack
page read and write
7847000
unkown
page read and write
400000
unkown
page readonly
9A60000
unkown
page read and write
336A000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page execute and read and write
7DD0000
unkown
page read and write
3040000
unkown
page read and write
400000
unkown
page readonly
313E000
trusted library allocation
page read and write
3420000
unkown
page read and write
1370000
unkown
page read and write
2A74000
trusted library allocation
page read and write
3359000
trusted library allocation
page read and write
C57F000
unkown
page read and write
3346000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
1DCCE39E000
trusted library allocation
page read and write
9A60000
unkown
page read and write
2FA4000
heap
page read and write
2880000
heap
page read and write
A39B000
unkown
page read and write
313E000
trusted library allocation
page read and write
1DCE6957000
heap
page read and write
1DCE810D000
heap
page read and write
3030000
unkown
page read and write
3137000
trusted library allocation
page read and write
7FF5ED937000
unkown
page readonly
3040000
unkown
page read and write
AB39000
unkown
page read and write
2A5D000
trusted library allocation
page read and write
3010000
unkown
page read and write
1A41B8A4000
direct allocation
page read and write
315E000
trusted library allocation
page read and write
7FD6AFE000
stack
page read and write
3020000
unkown
page read and write
1E64A990000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
15BEB117000
trusted library allocation
page read and write
3460000
unkown
page read and write
2EC2F95C000
trusted library allocation
page read and write
9AA0000
unkown
page read and write
7DB0000
unkown
page read and write
B330000
unkown
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
2EC2F968000
trusted library allocation
page read and write
E81D000
stack
page read and write
449000
trusted library allocation
page execute and read and write
3111000
trusted library allocation
page read and write
15BF3883000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
2ABC000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
336A000
trusted library allocation
page read and write
740000
remote allocation
page execute and read and write
7FFD9BB70000
trusted library allocation
page read and write
E91D000
stack
page read and write
7E70000
unkown
page read and write
3341000
trusted library allocation
page read and write
7865000
unkown
page read and write
C516000
unkown
page read and write
3030000
unkown
page read and write
4F42000
trusted library allocation
page read and write
3122000
trusted library allocation
page read and write
1DCE68F0000
heap
page read and write
2B17000
trusted library allocation
page read and write
7953000
unkown
page read and write
F56C9FE000
stack
page read and write
C89C000
unkown
page read and write
5E1000
heap
page read and write
B987FF000
stack
page read and write
15BF3980000
heap
page read and write
2990000
heap
page read and write
A50B000
unkown
page read and write
9D00000
heap
page read and write
3034000
heap
page read and write
AF0C000
stack
page read and write
6000000
trusted library allocation
page read and write
3037000
heap
page read and write
3155000
trusted library allocation
page read and write
7FF764952000
unkown
page write copy
1DCCE986000
trusted library allocation
page read and write
7FFD9BC0C000
trusted library allocation
page read and write
56D9000
unkown
page read and write
2667000
trusted library allocation
page execute and read and write
3030000
unkown
page read and write
3170000
unkown
page read and write
219E000
stack
page read and write
2BB3000
trusted library allocation
page read and write
3420000
unkown
page read and write
303E000
heap
page read and write
100000
trusted library allocation
page read and write
4FA7000
trusted library allocation
page read and write
3030000
unkown
page read and write
C000092000
direct allocation
page read and write
15BDB111000
trusted library allocation
page read and write
336A000
trusted library allocation
page read and write
7D80000
unkown
page read and write
3037000
heap
page read and write
15BF3A50000
heap
page read and write
7FF7648ED000
unkown
page readonly
2C56000
trusted library allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
1DCCC50D000
heap
page read and write
2FA0000
heap
page read and write
7FF5ED426000
unkown
page readonly
1500000
heap
page read and write
A4B8000
unkown
page read and write
2B15000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
402000
unkown
page readonly
2B59000
trusted library allocation
page read and write
7DC0000
unkown
page read and write
1370000
unkown
page read and write
1A460DD0000
direct allocation
page read and write
4FCF000
trusted library allocation
page read and write
3170000
unkown
page read and write
5D01000
heap
page read and write
4FCF000
trusted library allocation
page read and write
2B76000
trusted library allocation
page read and write
987F000
unkown
page read and write
7FF5D1CD4000
unkown
page readonly
9871000
unkown
page read and write
3030000
unkown
page read and write
7CC0000
unkown
page readonly
B370000
unkown
page read and write
2BD7000
trusted library allocation
page read and write
9B60000
unkown
page readonly
C000162000
direct allocation
page read and write
C000062000
direct allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
5A4F000
stack
page read and write
7DC0000
unkown
page read and write
2C03000
trusted library allocation
page read and write
C00009E000
direct allocation
page read and write
7FF764860000
unkown
page readonly
301F000
heap
page read and write
C0003E3000
direct allocation
page read and write
9AA0000
unkown
page read and write
334A000
trusted library allocation
page read and write
2FB8000
heap
page read and write
7DF44CF00000
trusted library allocation
page execute and read and write
C0008E6000
direct allocation
page read and write
2EC30074000
trusted library allocation
page read and write
7FFD9BBF9000
trusted library allocation
page read and write
310A000
trusted library allocation
page read and write
5490000
trusted library allocation
page read and write
379E000
unkown
page read and write
7FFD9B883000
trusted library allocation
page execute and read and write
3420000
unkown
page read and write
7FF764952000
unkown
page read and write
47B000
heap
page read and write
2FB8000
heap
page read and write
8BF0000
unkown
page readonly
4F64000
trusted library allocation
page read and write
BDD0000
unkown
page readonly
2EC2F941000
trusted library allocation
page read and write
3030000
unkown
page read and write
7FFD9B88D000
trusted library allocation
page execute and read and write
C0000B6000
direct allocation
page read and write
3170000
unkown
page read and write
7FF5ED449000
unkown
page readonly
7FFD9BB60000
trusted library allocation
page read and write
3034000
heap
page read and write
3170000
unkown
page read and write
3030000
unkown
page read and write
1E64A6F5000
heap
page read and write
A379000
unkown
page read and write
FD39000
unkown
page read and write
400000
unkown
page readonly
2620000
trusted library allocation
page read and write
2B35000
trusted library allocation
page read and write
57AE000
trusted library allocation
page read and write
7DD0000
unkown
page read and write
7D80000
unkown
page read and write
6C9F1000
unkown
page execute read
4F58000
trusted library allocation
page read and write
7FF5ED853000
unkown
page readonly
35A0000
unkown
page readonly
33B9000
stack
page read and write
303E000
heap
page read and write
3A25000
trusted library allocation
page read and write
2771000
unclassified section
page readonly
BC9B000
stack
page read and write
7FF5ED9C6000
unkown
page readonly
1370000
unkown
page read and write
C00013C000
direct allocation
page read and write
9AA0000
unkown
page read and write
3030000
unkown
page read and write
2EC461D0000
heap
page read and write
336A000
trusted library allocation
page read and write
4B56000
unkown
page read and write
2BB4000
trusted library allocation
page read and write
E0000
trusted library section
page read and write
3020000
unkown
page read and write
4F8D000
trusted library allocation
page read and write
3034000
heap
page read and write
310E000
stack
page read and write
1370000
unkown
page read and write
FE54000
unkown
page read and write
3047000
heap
page read and write
3420000
unkown
page read and write
2B97000
trusted library allocation
page read and write
27D0000
heap
page read and write
7D80000
unkown
page read and write
275E000
unclassified section
page readonly
7FF65BBCE000
unkown
page write copy
7FD66FF000
stack
page read and write
3ABBBFE000
stack
page read and write
There are 3548 hidden memdumps, click here to show them.